• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4587 Courses in Cardiff delivered Online

HTTP streaming methods

5.0(3)

By Systems & Network Training

HTTP streaming training course description This course looks at the delivery of video streams using HTTP adaptive streaming. Both MPEG DASH and HLS are investigated. Hands on sessions primarily involve using Wireshark to analyse streams. What will you learn Use Wireshark to analyse and troubleshoot HTTP video streams. Explain HTTP adaptive streaming works. Evaluate and compare MPEG DASH and HLS. Use tools to create HTTP adaptive streams. HTTP streaming training course details Who will benefit: Anyone working in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 2 days HTTP streaming training course contents What is HTTP streaming? The old way. Progressive downloads versus streaming. Why not UDP and RTP for delivery? Adaptive bit rate streaming. Standards. Hands on Base network setup. Using WireShark for HTTP streams. HTTP protocol stack IP, TCP, IPv6. HTTP. HTTP 1.0, HTTP 1.1, HTTP 2.0, HTTP header fields. HTML 5. Hands on Analysing HTTP. Adaptive bitrate streaming principles Chunks, fragments, segments. Manifest files. Encoding, resolution, bitrates. Addressing, relative and absolute URLs, redirection. When does the client switch streams? Switch points. Hands on Walk through of client behaviours on a stream. HTTP streaming architecture Server components, distribution components, client software. CDN, caching, multiple servers. Hands on Analysing CDN and Internet delivery. TCP and HTTP streaming interactions TCP ACK, TCP connections, unicast only. TCP flow control, TCP and performance. Hands on TCP window sizes. MPEG DASH Stakeholders, DASH architecture and model, codec agnostic, XML, Media Presentation Description, Media Presentation, segment formats. Hands on MPEG DASH analysis. HTTP Live Streaming and others Stakeholders. Media segments, media playlists, master playlists. Adobe HTTP dynamic streaming, Microsoft smooth streaming. Hands on Analysing HLS. Tools mp4dash, mp4fragment, libdash. Apple developer tools for HLS. Hands on Creating segmented content. Security HTTPS, encryption, content protection. Hands on Encryption analysis. Summary Choosing a streaming method. Impact of live versus VoD. Web sockets.

HTTP streaming methods
Delivered in Internationally or OnlineFlexible Dates
£1,727

Criminology, Crime Analysis & Criminal Psychology

4.7(47)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Criminology, Crime Analysis & Criminal Psychology Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Unravel the mysterious world of crime and its intricacies with our "Criminology, Crime Analysis & Criminal Psychology" course bundle. Enrich your understanding with three Quality Licence Scheme (QLS) endorsed courses on Criminology and Police Investigations, Crime Analysis, and Criminal Psychology and Profiling, all of which come with hardcopy certificates for proof of your new theoretical knowledge. Moreover, dive deeper into the theoretical realm of crime studies with five CPD Quality Service (QS) accredited courses that complement your understanding. With Forensic Science Level 3, Criminal Law, Accident Investigation, Security Management Diploma, and Crime Scene Investigator courses, gain a panoramic view of criminology, crime analysis, and criminal psychology. Our bundle is curated to offer comprehensive knowledge about various aspects of crime and justice. Propel your understanding beyond the surface, delve into the psyche of criminals, comprehend crime scenes, and interpret law and order. Embrace the opportunity to decode the complex world of crime with our "Criminology, Crime Analysis & Criminal Psychology" course bundle. Key Features of the Criminology, Crime Analysis & Criminal Psychology Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our Criminology, Crime Analysis & Criminal Psychology bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Criminology and Police Investigations QLS Course 02: Crime Analysis Online Course QLS Course 03: Criminal Psychology and Profiling 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Forensic Science Level 3 CourseCourse 02: Criminal LawCourse 03: Accident investigationCourse 04: Security Management DiplomaCourse 05: Crime Scene Investigator In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV WritingCourse 02: Job Search SkillsCourse 03: Self Esteem & Confidence BuildingCourse 04: Professional Diploma in Stress ManagementCourse 05: Complete Communication Skills Master Class Convenient Online Learning: Our Criminology, Crime Analysis & Criminal Psychology courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes: Gain a comprehensive understanding of criminology and police investigations. Learn the theory and application of crime analysis. Comprehend the theories of criminal psychology and profiling. Understand the theoretical aspects of forensic science. Develop a deep understanding of criminal law and security management. Learn the theory behind accident investigation and crime scene investigation. Expand career opportunities in the field of criminology, crime analysis, and criminal psychology. The "Criminology, Crime Analysis & Criminal Psychology" bundle is an amalgamation of eight courses designed to provide an in-depth theoretical understanding of the complex world of crime. It touches upon every facet, from the basics of criminology, criminal psychology, and profiling to the application of forensic science and criminal law. The course bundle doesn't just stop at understanding crime but extends into its analysis and the legal systems around it. It broadens your knowledge horizon to include security management, accident investigation, and crime scene investigation. The comprehensive coverage of these topics offers a panoramic view of crime and justice, highlighting the intertwined nature of these domains and their importance in maintaining law and order. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals intrigued by criminology, crime analysis, and criminal psychology. Aspiring professionals seeking a comprehensive theoretical foundation in crime studies. Law enforcement enthusiasts interested in understanding crime from various angles. Anyone interested in exploring career opportunities in criminology and criminal psychology. Career path Criminologist - Average salary in the UK: £30,000 - £35,000 per annum Crime Analyst - Average salary in the UK: £27,000 - £32,000 per annum Criminal Psychologist - Average salary in the UK: £35,000 - £40,000 per annum Forensic Scientist - Average salary in the UK: £25,000 - £30,000 per annum Security Manager - Average salary in the UK: £45,000 - £50,000 per annum Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

Criminology, Crime Analysis & Criminal Psychology
Delivered Online On Demand3 days
£309

IP broadcast fundamentals

5.0(3)

By Systems & Network Training

IP broadcast training course description A current hot topic in recent years has been the provision of multimedia services over IP networks aka triple or quadruple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Use Wireshark to analyse and troubleshoot TV streams. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate IPTV technologies. Design data networks, which will support IPTV. IP broadcast training course details Who will benefit: Anyone working in broadcast. Prerequisites: TCP/IP foundation for engineers Duration 3 days IP broadcast training course contents What is IPTV? What is IP? What is TV? Pixels, frames, colour, digital modulation, digital video broadcasting. SDTV, HDTV, 4K. IPTV architectures, Contribution, distribution, delivery. IPTV standards. Hands on Base IP connectivity, VLC. IPTV protocol stacks IP, TCP, UDP, RTP. IPv6. HTTP. Bandwidth requirements. Hands on IPTV bandwidth calculations. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands on Analysing MPEG frames. IP issues Quality vs. bandwidth. Bandwidth, delay, latency, jitter, signalling. Routers. Hands on Analysing jitter and other performance issues. IPTV performance and QoS IP DSCP field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, Diffserv. 802.1Q. Traffic shaping. QoE. Hands on best effort versus prioritisation. UDP versus TCP Reliable, unreliable, connection oriented, connectionless. Broadcasts, multicasts and unicasts. TCP flow control, TCP and performance. Hands on TCP window sizes. RTP RTP, ports, mixers, translators, RTCP, SMPTE, FEC. Hands on RTP analysis with Wireshark. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, PIM-SM, SSM. MLD. Hands on Analysing multicast streams. OTT TV HTTP, HTTPS, Chunked HTTP. Adaptive streaming. HTML5. DASH vs HLS. Hands on Analysing HTTP streams. Security Firewalls, TLS, DRM, watermarking. Encryption. Geolocation. VPNs. IPTV architecture and other protocols Content providers, Service providers, delivery networks, home networks. Caching, Service discovery. RTSP. SAP, SDP. DHCP, DNS, NTP

IP broadcast fundamentals
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total IPTV for engineers

5.0(3)

By Systems & Network Training

IPTV training course description A current hot topic in recent years has been the provision of multimedia services over IP networks aka triple or quadruple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Use Wireshark to analyse and troubleshoot TV streams. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate IPTV technologies. Design data networks, which will support IPTV. IPTV training course details Who will benefit: Anyone working with IPTV. Prerequisites: TCP/IP Foundation for engineers Intro to data communications & networking. Duration 3 days IPTV training course contents What is IPTV? What is IP? What is TV? Pixels, frames, colour, digital modulation, digital video broadcasting. SDTV, HDTV, 4K. IPTV architectures, Contribution, distribution, delivery. IPTV standards. Hands on Base IP connectivity, VLC. IPTV protocol stacks IP, TCP, UDP, RTP. IPv6. HTTP. Bandwidth requirements. Hands on IPTV bandwidth calculations. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands on Analysing MPEG frames. IP issues Quality vs. bandwidth. Bandwidth, delay, latency, jitter, signalling. Routers. Hands on Analysing jitter and other performance issues. IPTV performance and QoS IP DSCP field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, Diffserv. 802.1Q. Traffic shaping. QoE. Hands on best effort versus prioritisation. UDP versus TCP Reliable, unreliable, connection oriented, connectionless. Broadcasts, multicasts and unicasts. TCP flow control, TCP and performance. Hands on TCP window sizes. RTP RTP, ports, mixers, translators, RTCP, SMPTE, FEC. Hands on RTP analysis with Wireshark. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, PIM-SM, SSM. MLD. Hands on Analysing multicast streams. OTT TV HTTP, HTTPS, Chunked HTTP. Adaptive streaming. HTML5. DASH vs HLS. Hands on Analysing HTTP streams. Security Firewalls, TLS, DRM, watermarking. Encryption. Geolocation. VPNs. IPTV architecture and other protocols Content providers, Service providers, delivery networks, home networks. Caching, Service discovery. RTSP. SAP, SDP. DHCP, DNS, NTP Hands on Fixing the network.

Total IPTV for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

FortiGate Infrastructure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate appliances. Overview Analyze a FortiGate's route table. Route packets using policy-based and static routes for multi-path and load balanced deployments. Configure SD-WAN to load balance traffic between multiple WAN links effectively. Inspect traffic transparently, forwarding as a Layer 2 device. Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs). Establish an IPsec VPN tunnel between two FortiGate appliances. Compare policy-based to route-based IPsec VPN. Implement a meshed or partially redundant VPN. Diagnose failed IKE exchanges. Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory. Deploy FortiGate devices as an HA cluster for fault tolerance and high performance. Deploy implicit and explicit proxy with firewall policies, authentication, and caching. Diagnose and correct common problems. In this two-day course, you will learn how to use advanced FortiGate networking and security. Course Outline Module 1. Routing Module 2. Software-Defined WAN (SD-WAN) Module 3. Layer 2 Switching Module 4. Virtual Domains Module 5. Site-to-Site IPsec VPN Module 6. Fortinet Single Sign-On (FSSO) Module 7. High Availability (HA) Module 8. Web Proxy Module 9. Diagnostics

FortiGate Infrastructure
Delivered OnlineFlexible Dates
Price on Enquiry

Essential SD-WAN

5.0(3)

By Systems & Network Training

Essential SD-WAN training course description SD-WAN is rapidly growing in use. This vendor neutral course starts with an introduction to what SD-WAN is and when it is useful. Each main area of SD-WAN is then studied in more detail to enable delegates to recognise the technologies used in SD-WAN and then use this information to evaluate SD-WAN products. What will you learn Describe what SD-WAN is (and isn't). Explain how SD-WAN works. Evaluate SD-WAN products. Compare and contrast SD-WAN with other technologies such as MPLS, Ethernet, SDN, NFV and WAN optimisation. Essential SD-WAN training course details Who will benefit: Anyone wishing to learn about SD-WAN. Prerequisites: Network fundamentals. Duration 1 day Essential SD-WAN training course contents What is SD-WAN? What is SD and SDN? What is WAN? Branch/ Office. MPLS, MPLS vs Internet, Ethernet, Broadband, LTE/4G, Cable, Satellite. The impact of the cloud. Single console, Dynamic path selection, automation. Why SD-WAN? Single console Network management, orchestration, administration. Example GUI interfaces. Northbound and southbound APIs. Dynamic path selection SD-WAN transports, Overlay networks, security. VPNs, IPsec. QoS and prioritization. Policies, traffic path rules. Application specific routing, bonding, optimisation. Automation Time saving, removing errors. Zero touch, ZOOM, ZTP. The role of the orchestrator. Real time monitoring of the network. APIs. Architecture and products Hardware solutions, software solutions, virtual appliances. Clouds. SD-WAN edge devices, SDWAN controllers, Orchestrators. HA and SD-WAN. Riverbed, Cisco, Juniper, others. Summary SD-WAN doesn't replace MPLS, virtualisation and SD-WAN. Relationship with SDN and NFV. SDWAN versus WAN optimisation.

Essential SD-WAN
Delivered in Internationally or OnlineFlexible Dates
£1,397

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This Virtual Instructor Led Training (VILT) course presents advanced methodologies that implement demand response and energy conservation programs in light of the integration of new technologies, regulatory changes and the accelerated penetration of renewable energy resources. This VILT course provides examples and case studies from North American and European jurisdictions covering the operational flexibilities on the demand side including requirements for new building codes to achieve zero net energy. The course describes a public agency's goals and objectives for conserving and otherwise reducing energy consumption and managing its demand for energy. This course presents the demand response implemented for economics and system security such as system balancing and relieving transmission congestion, or for system adequacy. The course also presents the principal attributes of conservation programs and the associated success criteria. In a system with increased penetration of renewable resources, demand response provides flexibility to system operators, helping them to maintain the reliability and the security of supply. Demand response is presented as a competitive alternative to additional power sources, enhancing competition and liquidity in electricity markets. The unique characteristics are discussed from a local, consumer centric and also from a system perspective bringing to life the ever changing paradigm for delivery energy to customers. Interoperability aspects and standards are discussed, as well as the consumer centric paradigm of Transactive Energy with IOT enabled flexibilities at system level, distribution networks and microgrids. The VILT course introduces the blockchain as a new line of defense against cyber threats and its increasing application in P2P transactions and renewable certificates. Our trainer's industry experience spans three decades with one of the largest Canadian utilities where she led or contributed to large operational studies and energy policies and decades of work with IEEE, NSERC and CIGRE. Our key expert also approaches to the cross sectional, interdisciplinary state of the art methodologies brings real life experience of recent industry developments. Training Objectives Innovative Digital Technologies How systems Facilitate Operational Flexibility on the Demand Side The Ecosystem of Demand Side Management Programs Advanced Machine Learning techniques with examples from CAISO Regulatory Policy Context and how to reduce regulatory barriers Industry Examples from NERC and ENTSO Relevant Industry standards: IEEE and IEC Manage Congestion with Distributed Operational Flexibilities: Grid to Distribution Controls; examples from NERC (NA) and ENTSO (Europe) Grid solutions with IEC 61850 communication protocols Decentralized grid controls The New Grid with accelerated V2G and Microgrids How DSM is and will be applied in Your System: Examples and discussions Target Audience Regulators and government agencies advising on public energy conservation programs All professionals interested in expanding their expertise, or advancing their career, or take on management and leadership roles in the rapidly evolving energy sector Energy professionals implementing demand side management, particularly in power systems with increased renewable penetration, to allow the much needed operational flexibility paramount to maintaining the reliability and stability of the power system and in the same time offering all classes of customers flexible and economical choices Any utility professional interested in understanding the new developments in the power industry Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your first expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Your second expert course leader is the co-founder and Director of Research at Xesto Inc. Xesto is a spatial computing AI startup based in Toronto, Canada and it has been voted as Toronto's Best Tech Startup 2019 and was named one of the top 10 'Canadian AI Startups to Watch' as well as one of 6th International finalists for the VW Siemens Startup Challenge, resulting in a partnership. His latest app Xesto-Fit demonstrates how advanced AI and machine learning is applied to the e-commerce industry, as a result of which Xesto has been recently featured in TechCrunch. He specializes in both applied and theoretical machine learning and has extensive experience in both industrial and academic research. He is specialized in Artificial Intelligence with multiple industrial applications. At Xesto, he leads projects that focus on applying cutting edge research at the intersection of spatial analysis, differential geometry, optimization of deep neural networks, and statistics to build scalable rigorous and real time performing systems that will change the way humans interact with technology. In addition, he is a Ph.D candidate in the Mathematics department at UofT, focusing on applied mathematics. His academic research interests are in applying advanced mathematical methods to the computational and statistical sciences. He earned a Bachelor's and MSc in Mathematics, both at the University of Toronto. Having presented at research seminars as well as instructing engineers on various levels, he has the ability to distill advanced theoretical concept to diverse audiences on all levels. In addition to research, our key expert is also an avid traveler and plays the violin. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Demand Side Management - Integration of New Technologies, Regulatory Changes & Renewable Energy Resources
Delivered in Internationally or OnlineFlexible Dates
£1,112 to £2,099

Certified Data Protection Officer Training (CDPO)

By Training Centre

  The IECB Certified Data Protection Officer training course will help you acquire the knowledge and skills to serve as a Data Protection Officer (DPO), allowing you to help organizations understand and implement solutions that meet the compliance requirements of the General Data Protection Regulation (GDPR), as well as a number of other regulatory requirements. The course takes a practical look at the GDPR requirements and advises on the mapping of solutions. In this way, delegates can master the role of the DPO and become competent to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority. About This Course   After attending the training course, you can sit for the exam, and gain the 'Certified Data Protection Officer' credential, which validates that you have the Legal and regulatory knowledge required of a key adviser and practical knowledge to advise organisations how to meet their obligations regarding the GDPR compliance   Learning Outcomes; Acquire a thorough understanding of the basic concepts and components of global Data Protection Regulation(s) Understand the correlation between the General Data Protection Regulation and best practice standards such as ISO 27701 Acquire a thorough understanding of the data protection by design requirements, particularly in relation to the protection of data Interpret the data protection requirements within the context of an organization Understand how to support an organization to plan, implement, manage, monitor and maintain ongoing compliance to the GDPR   Our approach  This training course is based on the practical application of best practices used in exercising the role of the DPO. Course modules include practical examples of the role of DPO. Delegates are encouraged to engage in discussions and exercises. A Case Study which brings the materials to life.   Course agenda   Day 1: Introduction to the GDPR Principles Day 2: The role of the DPO in the determination of a GDPR compliance program Day 3: The role of the DPO in business operations Day 4: Monitoring and maintenance of the GDPR compliance programme, as well as the examination   Prerequisites   A basic understanding of the GDPR will benefit course delegates.  What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam fees Who Should Attend?   Individuals seeking to move into the role of DPO Team members who define, implement, and maintain a GDPR compliance programme Information Security Managers responsible for the personal data protection of an enterprise and the management of its risks Members of an information security, risk management, or Data Governance team Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and train for free, with the exam retake included too. Assessment   All candidates at official training courses will be offered the opportunity to sit the associated exam. For CDPO, this constitutes a 12 question essay type exam which should be completed within 240 minutes. A passing score is achieved at 70%. Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB.

Certified Data Protection Officer Training (CDPO)
Delivered OnlineFlexible Dates
£1,450

IT Asset Management

5.0(1)

By LearnDrive UK

Step into the world of IT Asset Management (ITAM) and elevate your skills. From establishing ITAM programs to mastering asset security and compliance, this course offers a comprehensive guide to managing IT assets effectively. Enhance your ITAM expertise today!

IT Asset Management
Delivered Online On Demand1 hour
£5

Learn Ethical Hacking From A-Z: Beginner To Expert

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£12