• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

256 Educators providing Courses delivered Live Online

Leopard Educational Training

leopard educational training

Mian Jehangir Shahid is the Chairman and founder of Leopards Courier Services Pvt. Ltd. Pakistan’s leading service provider in the logistics, Courier & Warehousing industry, which connects people nationwide and offers services in the most remote areas of the country. Born on July 15th, 1947, Mian Jehangir Shahid grew up in Lahore with his five siblings. Their father, Saadat Din, was a cotton dealer and his mother was a homemaker. He attended school away from his family in the city of Abbottabad, at the Abbottabad Public School. He was always an inquisitive and innovative student who liked to experiment with new ideas; an aptitude which would later lead him to find his potential in the courier industry. After completing his Master’s Degree in Economics, Mian Jehangir Shahid has moved to Karachi in 1970 and joined a newly growing advertising industry in Pakistan. His company made billboards that targeted the cities’ major commercial districts. New ideas for promoting products were being developed as the concept of advertising was becoming popular. However, as a recession hit the country in the 1970s, businesses in Pakistan were greatly de-valued and could no longer afford to spend money on expensive advertisement campaigns. Then entering the manufacturing industry following his advertising streak, he was surprised by the involuntary lack of correspondence between businesses due to the lack of a secure and systemized courier or postal service. Seeing a potential for a courier company that could connect the whole nation, Mian Jehangir Shahid established Leopards Courier Services Pvt. Ltd. in 1983 with five destinations in the country. His foresight and vision lead towards the expansion of the company, and after establishing one of the largest nationwide networks, Leopards went international in the year 2000, setting up offices in Dubai, Singapore and China. Moreover, Mian Jehangir Shahid in recent past opened Leopards logistics and shipments; a division of leopards focused on the national and international transportation of heavy shipments and containers. Keeping in view the philosophy of transformation and evolution within the industry in recent times, Mian Jehangir Shahid focuses on constant transformation & digitalization of current operations processes at leopards. Enabling technologies such as Sensors, IOT, Data Analytics, Auto Sortation & Sort to light technology and robotics are being deployed into specialized applications. These technological advancements, the introduction of new systems, processes, tech teams, will take them to be a leading digitalized Logistics & Courier Group. Mian Jehangir Shahid always quotes his son as part of his company’s success, Rizwan Saadat who has been in the business with him since his childhood. And now Mashallah he has become a valuable asset for the company. Leading from the front as CEO of Leopards Courier Services Pvt. Ltd.

azure trainings

azure trainings

In the fast-paced world of technology, cloud computing skills are increasingly essential. Microsoft Azure, a leading cloud platform, offers a vast array of services that empower organizations to build, deploy, and manage applications efficiently. For IT professionals aiming to advance their careers, optimize their company's IT infrastructure, or keep up with the latest industry trends, Azure training is a critical investment. WHY CHOOSE AZURE? Azure stands out among cloud platforms for several reasons: 1. Scalability and Flexibility: Azure's infrastructure can scale to match your workload, providing cost-efficiency and flexibility. 2. Security: Azure boasts top-tier security measures and compliance certifications, ensuring robust protection for your data and applications. 3. Global Reach: Azure’s global network of data centers ensures high availability and low latency. 4. Comprehensive Services: From virtual machines to advanced AI and machine learning, Azure offers a wide range of services to meet diverse business needs. 5. Seamless Integration: Azure integrates smoothly with other Microsoft products, creating a cohesive ecosystem for businesses. THE IMPORTANCE OF AZURE TRAINING Azure training equips you with the skills and knowledge to effectively leverage Azure services. Key benefits include: 1. Career Advancement: Cloud computing expertise is in high demand, and Azure certification can enhance job prospects and earning potential. 2. Operational Efficiency: Proficiency in Azure allows you to optimize your organization’s cloud infrastructure, leading to cost savings and improved performance. 3. Driving Innovation: Azure training enables you to harness cutting-edge technologies like AI, machine learning, and IoT, fostering innovation. 4. Enhanced Security and Compliance: Proper training ensures you can implement Azure's security features effectively, maintaining compliance with industry standards. KEY COMPONENTS OF AZURE TRAINING Azure training covers a wide range of topics and expertise levels. Here are the essential components: 1. FUNDAMENTALS Azure Fundamentals (AZ-900): Ideal for beginners, this entry-level certification covers the basics of cloud computing and introduces Azure services, pricing, and support. Key topics include: * Core Azure services (compute, networking, storage, and databases) * Basic cloud concepts (public, private, and hybrid cloud) * Azure pricing and support plans * Security, compliance, and trust in Azure 2. ASSOCIATE LEVEL Azure Administrator (AZ-104): Designed for professionals responsible for managing Azure subscriptions, implementing storage solutions, and managing virtual networks. Key topics include: * Managing Azure identities and governance * Implementing and managing storage * Deploying and managing Azure compute resources * Configuring and managing virtual networking * Monitoring and maintaining Azure resources Azure Developer (AZ-204): This certification focuses on designing, building, testing, and maintaining cloud applications and services on Azure. Key topics include: * Developing Azure compute solutions * Developing for Azure storage * Implementing Azure security * Monitoring, troubleshooting, and optimizing Azure solutions * Connecting to and consuming Azure services and third-party services 3. EXPERT LEVEL Azure Solutions Architect (AZ-305): For experienced IT professionals who design solutions on Azure, this certification covers advanced topics such as: * Designing for identity and security * Designing a data platform solution * Designing for deployment, migration, and integration * Designing an infrastructure strategy Azure DevOps Engineer (AZ-400): Targeting professionals who combine people, processes, and technologies to deliver continuous value, this certification covers: * Designing a DevOps strategy * Implementing DevOps development processes * Implementing continuous integration and delivery * Implementing dependency management * Implementing application infrastructure * Implementing continuous feedback HANDS-ON LABS AND REAL-WORLD PROJECTS Azure training programs often include hands-on labs and real-world projects to reinforce theoretical knowledge and gain practical experience. Through these components, you can: * Deploy and manage virtual machines * Configure and manage Azure networking * Implement and manage Azure storage solutions * Develop and deploy Azure applications * Automate tasks using Azure DevOps and other tools CERTIFICATION PATHWAYS Azure certifications are structured to provide a clear learning path. Starting with fundamentals, you can progress to associate and expert levels, aligning your training with your career goals. Each certification requires passing specific exams, and Microsoft offers a wealth of resources to help you prepare, including: * Official Microsoft learning paths * Instructor-led training courses * Practice exams * Online tutorials and documentation STAYING UPDATED Azure is a constantly evolving platform with frequent updates and new services. To stay current, consider the following: * Regularly review Azure updates and release notes * Participate in Azure webinars and online communities * Subscribe to Azure blogs and newsletters * Engage in continuous learning through advanced courses and certifications CONCLUSION Azure training is a valuable investment in your professional development. Whether you are an aspiring IT professional, a seasoned administrator, or a developer seeking to expand your skill set, Azure offers numerous opportunities to grow and innovate. By obtaining Azure certifications and gaining hands-on experience, you can position yourself as a cloud expert and drive significant value within your organization. Begin your Azure training journey today and unlock the full potential of cloud computing!

EduCBA

educba

POPULAR ALL-IN-ONE BUNDLE COURSES All In One Financial Analyst Bundle | All In One Data Science Bundle | All In One Software Development Bundle | All In One Excel VBA Bundle | All In One Design Bundle | All In One Project Management Bundle | All In One Personal Development Bundle | All In One Marketing Bundle | POPULAR FINANCE CERTIFICATION COURSES Investment Banking Course | Financial Modeling Course | Project Finance Training | Business Valuation Training | Accounting Course Bundle | Financial Analytics Training | Mergers & Acquisition Course | Finance For Non Finance Managers Course | Cryptocurrency Training | US GAAP Course | LBO Modeling Course | Hedge Funds Course | IFRS Training | Credit Risk Modeling Course | GST Training Program | Mutual Funds Training | Private Equity Training | Venture Capital Course | Fixed Income Course | Equity Research Training | Corporate Finance Training Bundle | POPULAR LIVE ONLINE COURSES Advanced Minitab Training | Tableau Desktop Training | PMP Certification Exam Prep Training | Data Science With Python | Machine Learning | Python GUI Training | Python Scripting | Java Programming | Ultimate .Net Training | Financial Modeling | TRENDING EXAM PREP COURSES CFA 1 | CFA 2 | FRM 1 | FRM 2 | CMA 1 | CMA 2 | PMP Training | PMI SP Training | PMI RMP Training | Scrum Master Training | Six Sigma Green Belt Prep Training | PMI ACP Training | CAPM Training | PgMP Training | CBAP Training | POPULAR DATA SCIENCE CERTIFICATION COURSES Data Science with Python Certification Course | Machine Learning Training | Hadoop Training Program | R Programming Training | SAS Training | EViews Econometrics Training | Cloud Computing Training | AWS Training | SPSS Training Program | IoT Training | Tableau Training | Deep Learning Training | Apache Pig Training | Splunk Training Program | Azure Training | Pandas And NumPy Tutorial | Hive Training | SEO Training | Multisim Training | Minitab Training | Salesforce Training | MapReduce Training | MS SQL Training | TensorFlow Training | Informatica Training | Microsoft Power BI Training | Ansible Training | QlikView Training | OpenCV Training | Docker Training | DevOps Training | MATLAB Training | BUSINESS ANALYTICS CERTIFICATION COURSES Business Analytics Training | Statistical Analysis Training | Data Visualization Training | Business Intelligence Training | Forecasting Models Course | Time Series Course | Fraud Analytics Course | Artificial Intelligence Training | Customer Analytics Training | Marketing Analytics Training | Time Series Analysis and Forecasting with Python | Time Series Analysis and Forecasting with Minitab | Time Series Analysis and Forecasting with Tableau | Time Series Analysis and Forecasting with R | Time Series Analysis and Forecasting with Excel | Time Series Analysis and Forecasting with SAS | Predictive Modeling with Python Course | Predictive Analytics Course | Predictive Modeling with SAS Enterprise Miner | POPULAR SOFTWARE AND DEVELOPMENT COURSES Python | iOS | VB.net | JavaScript | Selenium | Java | Android | C++ | Windows Forms | XML Training | Angular JS | Linux | Bootstrap | Swift Training | JDBC Training | Ruby On Rails | J2EE | WPF | HTML Training | Ionic 4 Tutorials | JQuery UI Course | Java Servlet | C Programming | Spring Boot Training Program | Red Hat Linux Training Program | Ubuntu Training Program | Spring Framework Training | ServiceNow | Joomla | ASP.net | Oracle | C# | ADO.net | JQuery | Ethical Hacking | Kali Linux | Cyber Security Training | Penetration Testing | Django | Windows 10 | SQL Training Program | CSS Training | TestNG | PLSQL | MongoDB | JUnit | Robotic Process Automation RPA Training | PHP Training | React JS Redux Training | PostgreSQL Course | POPULAR DESIGN AND DRAWING COURSES AutoCAD Training | SketchUp Course | SolidWorks Training | Unity Training | Unreal Engine Training | MonoGame Course | DirectX Training | Photoshop Training | Corel Draw Training | Illustrator Training | OpenGL Course | POPULAR FILM EDITING AND VFX COURSES After Effects Training | Cinema 4D Training | Pixelan VFX Tutorial | Boris FX Tutorial | Blackmagic Fusion Training | RealFlow Tutorial | Autodesk Combustion Training | Natron Tutorial | Nuke Training | Silhouette FX Tutorial | Sony Vegas Pro Tutorial | Adobe Premiere Pro Tutorial | DaVinci Resolve Training | NewBlueFX Tutorial | Lightworks Tutorial | Avid Media ComposerTraining | FL Studio Training | Melodyne Tutorial | Pro Tools Training | Audacity Training | TOP 3D MODELING AND ANIMATION COURSES Maya Training | Houdini Training | 3D Max Training | Blender Course | ZBrush Training | Cinema 4D Training | Mudbox Course | POPULAR EXCEL AND OFFICE PRODUCTIVITY COURSES Excel Training | Excel Advanced Training | VBA Training | Excel Data Analysis Training | Excel For HR Training | Excel For Finance Training | Excel For Marketing Training | Pivot Table Training | Microsoft Access Training | MS Office Training | MS Office For MAC | Microsoft Word Training | TOP BUSINESS AND MANAGEMENT COURSES Strategic Management Training | Marketing Training Program | Digital Marketing Training | CRM Training | Market Research Training | Content Marketing Course | Logistics And Supply Chain Training | Business Analysis Training | Retail Management Training | Content Development Training | Job Interview Training | Personality Development Course | Quality Management Training | Project Management Training Program | Agile Scrum Training | Primavera Training | Lean Management Training | Project Estimation Training | Project Cost Management Training | Project Planning Course | TRENDING RESOURCES Blog | Python Tutorial | Java Tutorial | C sharp Tutorial | HTML Tutorial | JavaScript Tutorial | PHP Tutorial | Big Data Tutorial | Hadoop Tutorial | Machine Learning Tutorial | Artificial Intelligence Tutorial | DevOps Tutorial | Tableau Tutorial | Photoshop Tutorial | After Effects Tutorial | Illustrator Tutorial | AutoCAD Tutorial | 3ds Max Tutorial | CorelDraw Tutorial | APPS EDUCBA Android AppEDUCBA iOS App Terms & Conditions Disclaimer Privacy Policy & Cookie Policy Shipping Policy ISO 10004:2018 & ISO 9001:2015 Certified © 2023 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS. Hello,how may I help you?}

Courses matching "Iot"

Show all 47

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797

The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities.

Internet of Things - IOT for leaders
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£50

IoT and Blockchain Training

By Nexus Human

Duration 1 Days 6 CPD hours Overview Please refer to Overview This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions Questions to help you design an IoT solution IoT Architecture Stage 1 - Data Generation (Sensors / Actuators) Stage 2 - Data Acquisition Systems Stage 3 - Edge Processing Stage 4 - Long-Term Data Storage / Blockchain What is Blockchain? History of Blockchain How does Blockchain work? Benefits of Blockchain Blockchain vs. conventional technology IoT / Blockchain Benefits of adding Blockchain to IoT Trust Building Cost Reduction Accelerate Data Exchanges Scaled Security for IoT Additional course details: Nexus Humans IoT and Blockchain Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IoT and Blockchain Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IoT and Blockchain Training
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Internet of Things Practitioner

By Mpi Learning - Professional Learning And Development Provider

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.

Certified Internet of Things Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. Course Outlines DEFINING CISCO IOT IOT NETWORKING AND OTHER DEVICES EXAMINING IOT PROTOCOLS EXAMINING IOT STANDARDS RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS USING PROGRAMMABILITY WITH CISCO IOT DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR DEFINING CISCO SECURITY APPLICATIONS Lab outline Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API Additional course details: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)
Delivered OnlineFlexible Dates
Price on Enquiry

Internet of Things demystified

5.0(3)

By Systems & Network Training

Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in Internationally or OnlineFlexible Dates
£967

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Online Securing the Internet of Things Networks

4.7(1243)

By Technique Learning Solutions

This course introduces the key concepts of the Internet of Things and cybersecurity. The course will provide an insight into the Internet of Things; the basics of cybersecurity; and describe a framework to protect IOT assets. This course will also examine real-world examples of IOT deployments and their cybersecurity, to highlight key lessons and key deployment actions that can be taken.

Online Securing the Internet of Things Networks
Delivered OnlineFlexible Dates
£500

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered OnlineFlexible Dates
Price on Enquiry