• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

922 Courses in Cardiff delivered Online

Network Security Engineer - 30 CPD Certified Courses!

By NextGen Learning

Get ready for an exceptional online learning experience with the Network Security Engineer bundle! This carefully curated collection of 30 premium courses is designed to cater to a variety of interests and disciplines. Dive into a sea of knowledge and skills, tailoring your learning journey to suit your unique aspirations. The Network Security Engineer is a dynamic package, blending the expertise of industry professionals with the flexibility of digital learning. It offers the perfect balance of foundational understanding and advanced insights. Whether you're looking to break into a new field or deepen your existing knowledge, the Network Security Engineer package has something for everyone. As part of the Network Security Engineer package, you will receive complimentary PDF certificates for all courses in this bundle at no extra cost. Equip yourself with the Network Security Engineer bundle to confidently navigate your career path or personal development journey. Enrol today and start your career growth! This Bundle Comprises the Following Network Security Engineer CPD Accredited Courses: Course 01: Computer Networks Security from Scratch to Advanced Course 02: CompTIA Network+ Certification (N10-007) Course 03: IT Administration and Networking Course 04: Mile2 Certified Network Forensics Examiner (CNFE) Course 05: Cyber Security Awareness Training Course 06: Python Programming Bible | Networking, GUI, Email, XML, CGI Course 07: CompTIA Security+ (SY0-601) Course 08: CompTIA PenTest+ (Ethical Hacking) Course 09: Web Application Penetration Testing Course Course 10: Cyber Law Online Course Course 11: Cyber Security Incident Handling and Incident Response Course 12: GDPR Course 13: Data Center Training Essentials: General Introduction Course 14: Internet of Things Course 15: SQL Database Basics for Everyone Course 16: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 17: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 18: Information Management Course 19: Learn Ethical Hacking From A-Z: Beginner To Expert Course 20: Quick Data Science Approach from Scratch Course 21: Deep Learning Neural Network with R Course 22: Deep Learning & Neural Networks Python - Keras Course 23: IT Helpdesk Administrator Training Course 24: Career Development Plan Fundamentals Course 25: CV Writing and Job Searching Course 26: Learn to Level Up Your Leadership Course 27: Networking Skills for Personal Success Course 28: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 29: Learn to Make a Fresh Start in Your Life Course 30: Motivation - Motivating Yourself & Others What will make you stand out? Upon completion of this online Network Security Engineer bundle, you will gain the following: CPD QS Accredited Proficiency with this Network Security Engineer bundle After successfully completing the Network Security Engineer bundle, you will receive a FREE CPD PDF Certificates as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Network Security Engineer bundle The online test with immediate results You can study and complete the Network Security Engineer bundle at your own pace. Study for the Network Security Engineer bundle using any internet-connected device, such as a computer, tablet, or mobile device. Each course in this Network Security Engineer bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This bundle promises not just education but an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Embrace the future of learning with the Network Security Engineer, a rich anthology of 30 diverse courses. Each course in the Network Security Engineer bundle is handpicked by our experts to ensure a wide spectrum of learning opportunities. ThisNetwork Security Engineer bundle will take you on a unique and enriching educational journey. The bundle encapsulates our mission to provide quality, accessible education for all. Whether you are just starting your career, looking to switch industries, or hoping to enhance your professional skill set, the Network Security Engineer bundle offers you the flexibility and convenience to learn at your own pace. Make the Network Security Engineer package your trusted companion in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Network Security Engineer bundle is perfect for: Lifelong learners looking to expand their knowledge and skills. Professionals seeking to enhance their career with CPD certification. Individuals wanting to explore new fields and disciplines. Anyone who values flexible, self-paced learning from the comfort of home. Requirements You are cordially invited to enroll in this bundle; please note that there are no formal prerequisites or qualifications required. We've designed this curriculum to be accessible to all, irrespective of prior experience or educational background. Career path Unleash your potential with the Network Security Engineer bundle. Acquire versatile skills across multiple fields, foster problem-solving abilities, and stay ahead of industry trends. Ideal for those seeking career advancement, a new professional path, or personal growth. Embrace the journey with the Network Security Engineerbundle package. Certificates CPD Quality Standard Certificate Digital certificate - Included 30 CPD Quality Standard Certificates - Free

Network Security Engineer - 30 CPD Certified Courses!
Delivered Online On Demand5 days
£199

Social Media for Business

5.0(5)

By Wimbledon Training Services

All about how to get the best out of social media in a business. Looking at business strategy, business development and the practicalities of employing people and agencies to support your social media activity.

Social Media for Business
Delivered Online On Demand
£178.80

CISSP®️ Certification Domain 8 - Software Development Security Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 8 - Software Development Security. This course focuses on how to secure software as we develop it. Domain 8 makes up 11% of the exam questions.

CISSP®️ Certification Domain 8 - Software Development Security Video Boot Camp for 2022
Delivered Online On Demand2 hours 52 minutes
£74.99

BCS International Diploma in Business Analysis - Start Today!

5.0(12)

By Duco Digital Training

Duco Digital Training's self study BCS International Diploma in Business Analysis course will help build your career as a business analyst, business architect, data analyst, enterprise analyst, management consultant...

BCS International Diploma in Business Analysis - Start Today!
Delivered Online On Demand12 days
£4,549

Cyber Security Awareness Training for Employees

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Overview Course Overview 00:04:00 Why Should You Care About Cybersecurity? Why Should You Care About CyberSecurity 00:03:00 Social Engineering What is Phishing and How Does it Work 00:08:00 What is Spear Phishing 00:03:00 What is Vishing and How Does it Work 00:04:00 Malware Malware - What is It and What Can it Do 00:02:00 How Can You Get Infected 00:02:00 How to Protect Against Malware 00:03:00 How Can You Tell if Your PC Infected 00:04:00 First Steps if You Realize You Have been Infected 00:01:00 How to Remove Malware from Your PC 00:02:00 Password Management What is Wrong with Your P@ssw0rd 00:05:00 Password Management Tools 00:04:00 Two-Factor Authentication 00:05:00 Use the Internet Securely Use Wireless Devices securely 00:04:00 Browse the Internet Securely 00:05:00 Maintain Physical Security Maintain Physical Security 00:03:00 Moving Forward Review and Suggestions to Stay Cyber Save 00:02:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security Awareness Training for Employees
Delivered Online On Demand
£19

Security Management Diploma

By IOMH - Institute of Mental Health

Overview Join our Security Management Diploma course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Security Management Diploma course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Security Management Diploma course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! You Will Learn The Following Things: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Security Management Diploma. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-to-one support from a dedicated tutor throughout your course. Study online - whenever and wherever you want. Instant Digital/ PDF certificate 100% money back guarantee 12 months access Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement After completing the Security Management Diploma course, you will receive your CPD-accredited Digital/PDF Certificate for £5.99. To get the hardcopy certificate for £12.99, you must also pay the shipping charge of just £3.99 (UK) and £10.99 (International). Who Is This Course for? This Security Management Diploma is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the Security Management Diploma course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Security Management Diploma Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Security Management Diploma Module 01: Introduction to Security Management Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations Module 08: Laws and Regulations 00:25:00 Optional Assignment Optional Assignment - Security Management Diploma 00:00:00

Security Management Diploma
Delivered Online On Demand3 hours 22 minutes
£11

Search Engine Optimisation for Business

5.0(5)

By Wimbledon Training Services

This course focuses on the anchor point of your digital marketing strategy which is your website or micro-site. Here we’ll explore search engine optimisation ‘SEO’ and how you can use this to drive traffic to your website.

Search Engine Optimisation for Business
Delivered Online On Demand
£178.80

CISSP®️ Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 3: Security Architecture and Engineering, which makes up 13% of the weighted exam questions; being so broad, it contains close to 25% of the exam materials.

CISSP®️ Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022
Delivered Online On Demand7 hours 37 minutes
£74.99

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Enterprise Mobility and Security Training

By Packt

Learn Microsoft Enterprise Mobility and Security Training

Microsoft Enterprise Mobility and Security Training
Delivered Online On Demand8 hours 17 minutes
£37.99