• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4540 Courses in Liverpool delivered Online

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Unified Communications Security v1.0 (UCSEC)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features

Cisco Implementing Cisco Unified Communications Security v1.0 (UCSEC)
Delivered OnlineFlexible Dates
Price on Enquiry

Offensive Hacking Unfolded - Become a Pro Pentester

By Packt

A beginner-friendly course for aspiring pentesters with 10+ hours of applied ethical hacking and security content covering core concepts such as using VMware, basics of Linux, Nmap, Metasploit, privilege escalation, known vulnerabilities, SQL injections, pivoting, cracking passwords, and much more. You need to know the basics of Linux and networking to get started.

Offensive Hacking Unfolded - Become a Pro Pentester
Delivered Online On Demand10 hours 19 minutes
£82.99

General Data Protection Regulation Foundation (GDPR F)

By Packt

Implement and manage a compliance framework to protect personal data using GDPR Foundation training.

General Data Protection Regulation Foundation (GDPR F)
Delivered Online On Demand5 hours 47 minutes
£93.99

Spring Security Core: Beginner to Guru

By Packt

This video course teaches you how to secure Java framework applications with Spring Security. With the help of interesting activities and examples, you'll learn about using the capabilities of Spring Boot for securing web applications and you'll also delve into the Test-Driven Development approach to understand the features of Spring Security.

Spring Security Core: Beginner to Guru
Delivered Online On Demand10 hours 48 minutes
£93.99

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

WordPress, Secure Programming & Web Application Penetration Testing

4.7(47)

By Academy for Health and Fitness

Unearth the secrets of the digital world with our riveting bundle, "WordPress, Secure Programming & Web Application Penetration Testing". This intensive collection of 8 highly detailed courses offers an enlightening journey into the realms of IT administration, networking, security, and cyber law. Our course bundle boasts three prestigious QLS-endorsed courses, namely WordPress for Beginners, Secure Programming of Web Applications - Developers and TPMs, and the Web Application Penetration Testing Course. The bundle doesn't stop there! Included are five additional courses that carry CPD QS accreditation. From IT Administration and Networking to the Computer Networks Security from Scratch to Advanced course, broaden your horizons and enrich your understanding in various relevant fields. Key Features of the WordPress, Secure Programming & Web Application Penetration Testing Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our WordPress, Secure Programming & Web Application Penetration Testing bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: WordPress for Beginner QLS Course 02: Secure Programming of Web Applications - Developers and TPMs QLS Course 03: Web Application Penetration Testing Course 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: IT Administration and Networking Course 02: CompTIA Security+ Certification - Complete Video Course Course 03: WordPress Security Mastery Course 04: Cyber Law Online Course Course 05: Computer Networks Security from Scratch to Advanced In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our WordPress, Secure Programming & Web Application Penetration Testing courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Remember, our courses are designed for deep learning. The three QLS-endorsed courses come with hardcopy certificates to acknowledge your academic achievements. These are not your average courses; they are a stepping-stone towards a successful career in the IT and cyber-security industry! Learning Outcomes: Gain an in-depth understanding of WordPress and its applications. Comprehend the fundamentals of secure web application programming. Acquire knowledge about penetration testing for web applications. Enhance your understanding of IT administration and networking. Familiarize with CompTIA Security+ and its significance. Grasp the essentials of cyber law and its implications. Develop a robust understanding of computer network security. Discover an expansive learning experience with our insightful bundle, "WordPress, Secure Programming & Web Application Penetration Testing". Traverse through a variety of disciplines, from the basics of WordPress and secure web application programming to the complexities of penetration testing, IT administration, and networking. In addition, become well-versed in cyber law and computer network security with our thorough and compelling courses. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals interested in learning about WordPress and secure web programming. Aspiring IT administrators and network professionals. Individuals eager to delve into the world of web application penetration testing. Professionals looking to enhance their knowledge of cyber law and network security. Career path WordPress Developer: £25,000 - £35,000 Web Application Security Engineer: £45,000 - £65,000 IT Administrator: £30,000 - £45,000 Network Security Engineer: £45,000 - £60,000 Cyber Law Consultant: £50,000 - £70,000 Penetration Tester: £35,000 - £55,000. Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

WordPress, Secure Programming & Web Application Penetration Testing
Delivered Online On Demand36 hours
£309

Practical Cyber Hacking Skills for Beginners

By Packt

Learn theoretical and practical skills in cybersecurity, ethical hacking, cyber management, and develop safe networking principles. We will cover crafting phishing mails, performing brute force attacks, conducting audits with Burp Suite, gather data with Maltego software, and safeguard systems and networks from phishing, malware, ransomware, and social engineering.

Practical Cyber Hacking Skills for Beginners
Delivered Online On Demand8 hours 23 minutes
£82.99

Incident Responder Diploma - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Incident Responder Diploma Mega Bundle** Incident Responder Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Incident Responder Diploma package online with Studyhub through our online learning platform. The Incident Responder Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Incident Responder Diploma course provides complete 360-degree training on Incident Responder Diploma. You'll get not one, not two, not three, but twenty-five Incident Responder Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Incident Responder Diploma courses are yours for as long as you want them once you enrol in this course This Incident Responder Diploma Bundle consists the following career oriented courses: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Ransomware Uncovered Specialist Certificate Course 03: Digital Forensic Science: Unraveling Cybercrime Mysteries Course Course 04: Foundations of IT Security: Protecting Digital Assets Course 05: Cyber Security Advanced Training Course 06: CompTIA CySA+ Cybersecurity Analyst Course Course 07: Cyber Security Awareness Training Course 08: Data Protection and Data Security (GDPR) Training Certification Course 09: Cyber Security Law Course 10: Information Governance and Data Management Training Course 11: Network Security and Risk Management Course 12: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 13: Computer Networks Security from Scratch to Advanced Course 14: Data Center Training Essentials: Mechanical & Cooling Course 15: IT Administration and Networking Course 16: CompTIA Network+ Certification (N10-007) Course 17: IT Support Technician: Troubleshooting and Technical Expertise Course 18: SQL Database Management Course 19: Quick Data Science Approach from Scratch Course 20: Deep Learning Neural Network with R Course 21: Computer Workstation Safety Training Course 22: Foundations of Artificial Intelligence Course 23: Functional Skills IT/ ICT Level 2 Course 24: Internet of Things (IoT) Course 25: Security Management and Fraud Prevention Training The Incident Responder Diploma course has been prepared by focusing largely on Incident Responder Diploma career readiness. It has been designed by our Incident Responder Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Incident Responder Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Incident Responder Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Incident Responder Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Incident Responder Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Incident Responder Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Incident Responder Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Incident Responder Diploma lessons One to one assistance from Incident Responder Diplomaprofessionals if you need it Innovative exams to test your knowledge after the Incident Responder Diplomacourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Incident Responder Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Incident Responder Diploma certificate and transcript on the next working day Easily learn the Incident Responder Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Incident Responder Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Incident Responder Diploma Requirements To participate in this Incident Responder Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Incident Responder Diploma Career path You will be able to kickstart your Incident Responder Diploma career because this course includes various courses as a bonus. This Incident Responder Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Incident Responder Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Incident Responder Diploma - CPD Certified
Delivered Online On Demand6 days
£279

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry