• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4635 Courses in Liverpool delivered Online

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered OnlineFlexible Dates
Price on Enquiry

Electronic Document and Record Management System (EDRMS)

5.0(10)

By GBA Corporate

Overview EDRMS Electronic Document and Record Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document and Record Management System (EDRMS)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Functional Skills Level 2 - QLS Endorsed Course

5.0(1)

By Training Express

**10 FREE QLS Endorsed Certificates and Included with Lifetime Access** Imagine The Functional Skills Level 2 course is designed to boost your knowledge and confidence in essential areas such as English, Maths, and ICT. This fully flexible course is perfect for anyone looking to enhance their abilities, regardless of previous experience. With a focus on key areas that employers value, this course is an excellent way to build a strong foundation for your future. Whether you're looking to improve your literacy skills, sharpen your numeracy, or become more adept with technology, this course provides the tools you need to succeed. It’s an opportunity to gain the qualifications that matter, without the need to attend any physical classes. Perfect for those who prefer a self-paced learning approach, the course ensures that you gain valuable skills, all from the comfort of your own space. Functional Skills - QLS Endorsed Bundle Includes the following Courses Course 01: Diploma in Functional Skills Maths at QLS Level 2 Course 02: Diploma in Functional Skills English at QLS Level 2 Course 03: Diploma in Functional Skills IT at QLS Level 2 Course 04: Diploma in Facilities Management at QLS Level 5 Course 05: Certificate in Office Admin and Organisation Skills at QLS Level 3 Course 06: Advanced Diploma in Project Management at QLS Level 7 Course 07: Advanced Diploma in Retail Management at QLS Level 7 Course 08: Diploma in Security Management at QLS Level 5 Course 09: Diploma in Life Coaching at QLS Level 5 Course 10: Certificate in Public Relations at QLS Level 3 Learning Outcomes Analytical Skills: Hone your analytical abilities for effective decision-making. Communication Techniques: Develop effective communication strategies for diverse settings. Strategic Mindset: Cultivate a strategic mindset in Facilities Management. Organisational Prowess: Enhance organisational skills in Office Administration. Project Planning: Master the art of project planning and execution. Retail Strategies: Gain insights into retail strategies and leadership principles. Security Protocols: Develop a keen awareness of security protocols and risk management. IT Proficiency: Expand IT proficiency and leverage digital tools for optimal performance. Life-saving Skills: Acquire life-saving skills with Paediatric First Aid Training. Public Relations Mastery: Navigate the intricate world of public relations with finesse. Key Features 10 FREE QLS Endorsed Certificate Fully online, interactive course Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Are you ready to elevate your skills, conquer challenges, and stand out in today's dynamic job market? Look no further! Introducing our exclusive Functional Skills - QLS Endorsed Bundle - a gateway to unlocking your true professional prowess. Immerse yourself in a comprehensive educational journey, spanning essential disciplines. From honing your mathematical prowess to mastering IT essentials, each course is meticulously crafted to elevate your proficiency. Dive into the intricacies of Facilities Management and gain insights into the dynamic realm of Retail Management. Navigate the nuances of Security Management and cultivate expertise in Office Administration and Organisation Skills. Take on a strategic path with our Advanced Diplomas in Project Management, fostering leadership and strategic thinking. Elevate your communication prowess with a Certificate in Public Relations, and ensure the safety of the little ones with a Certificate in Paediatric First Aid Training. This diverse bundle provides a holistic approach to skills development, empowering you with a rich tapestry of knowledge. Discover a host of practical learning outcomes as you progress through the courses. Sharpen your analytical abilities, enhance problem-solving skills, and cultivate a strategic mindset in Facilities Management. Develop effective communication techniques and organisational prowess in Office Administration. Master the art of project planning and execution with the Advanced Diploma in Project Management. Acquire a deep understanding of retail strategies and leadership principles in Retail Management. Foster a keen awareness of security protocols and risk management in Security Management. Expand your IT proficiency and leverage digital tools for optimal performance. Cultivate life-saving skills with a Certificate in Paediatric First Aid Training. Navigate the intricate world of public relations, mastering communication strategies for various contexts. Join us in redefining the learning experience. It's not just about gaining knowledge; it's about mastering Functional Skills that make you indispensable in any industry. Your success story begins here - where theory meets practice, and potential becomes performance. Certificate Once you've successfully completed your course, you will immediately be sent a CPD Accredited PDF certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). After successfully completing the assignment, learners will be able to order FREE QLS Endorsed certificate for Each Courses. CPD 55 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals seeking versatile skills enhancement. Those aiming to excel in facilities and security management. Aspiring office administrators and organisational wizards. Project management enthusiasts eager for strategic expertise. Retail management enthusiasts with leadership aspirations. IT enthusiasts aiming for enhanced proficiency. Individuals passionate about effective public relations. Caregivers and childcare professionals seeking first aid training. Career path Facilities Manager Security Manager Office Administrator Project Manager Retail Manager Public Relations Specialist Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included Hardcopy Certificate (UK Delivery): For those who wish to have a physical token of their achievement, we offer a high-quality, printed certificate. This hardcopy certificate is also provided free of charge. However, please note that delivery fees apply. If your shipping address is within the United Kingdom, the delivery fee will be only £3.99. Hardcopy Certificate (International Delivery): For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. QLS Endorsed Certificate Hard copy certificate - Included

Functional Skills Level 2 - QLS Endorsed Course
Delivered Online On Demand1 hour
£499

Logistic Management, Merchandising & Retail Associate

4.7(47)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Logistic Management, Merchandising & Retail Associate Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Take the leap and invest in your professional growth with the Law 3 QLS Bundle, offering an in-depth exploration of Business Law, International Law and Cyber Security. This comprehensive package boasts three QLS-endorsed courses, certifying your theoretical mastery in these key areas. But the learning doesn't stop there! You'll also receive five CPD QS accredited courses, enhancing your knowledge with relevant international business principles, case studies, development studies, relations and advanced Cyber Security training. These courses are crafted for discerning learners, creating a world of opportunities for you to understand complex legalities, global affairs, and security challenges. Witness a transformation in your problem-solving and decision-making skills, as you explore these eight immersive courses. Best of all, hardcopy certificates are included with the QLS-endorsed courses, providing tangible evidence of your professional development. In a rapidly globalising world, command over Business Law, International Law and Cyber Security could set you apart from your peers. Equip yourself with the knowledge you need to navigate the intricate legal landscape and safeguard vital information in the digital age. Remember, knowledge is power. And the Law 3 QLS Bundle is your key to unlocking that power. Key Features of the Law 3 QLS Bundle (Business Law, International Law & Cyber Security) Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our Logistic Management, Merchandising & Retail Associate bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Logistic Management QLS Course 02: Merchandising QLS Course 03: Retail Associate Certificate 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Retail Management Course 02: Supply Chain Management Course 03: Certificate in Purchasing and Procurement Course 04: Transport Manager Course 05: Visual Merchandising Diploma In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our Logistic Management, Merchandising & Retail Associate courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes: Comprehend the intricacies of Business Law and its application in real-world situations. Gain a robust understanding of International Law, including Criminal Law, Commercial Law, and Environmental Law. Develop a strong theoretical knowledge base in Cyber Security Law. Understand the principles of International Business, along with case studies and development studies. Learn about International Relations and how it impacts global affairs. Master advanced concepts in Cyber Security, fortifying your knowledge of digital protection. Earn three QLS-endorsed certificates and five CPD QS accredited certificates upon completion. The Law 3 QLS Bundle is an all-encompassing educational package focused on Business Law, International Law, and Cyber Security. It delves deep into these topics, offering learners a complete theoretical understanding of each. It doesn't just provide knowledge, but also a unique perspective on how these laws affect our lives, businesses, and society. In addition, the bundle features five complementary courses that broaden your knowledge in International Business Principles, Business Case Studies, International Development Studies, International Relations, and Advanced Cyber Security Training. This mix of courses ensures that you are well-rounded in your understanding, and that you are equipped with valuable insights in these crucial fields. CPD 270 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals looking to deepen their understanding of Business Law, International Law, and Cyber Security. Professionals aiming to enhance their skills in global business principles and international relations. Aspiring legal and cyber security professionals seeking a theoretical base. Anyone interested in a comprehensive understanding of these complex and important areas. Career path Legal Consultant: Average Salary £45,000 - £80,000 International Law Advisor: Average Salary £55,000 - £90,000 Cyber Security Analyst: Average Salary £30,000 - £55,000 Compliance Officer: Average Salary £35,000 - £60,000 International Development Consultant: Average Salary £40,000 - £75,000 Business Analyst: Average Salary £40,000 - £70,000 Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

Logistic Management, Merchandising & Retail Associate
Delivered Online On Demand3 days
£309

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£11.99

Managing and Troubleshooting PCs - Part 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing and Troubleshooting PCs - Part 2
Delivered OnlineFlexible Dates
Price on Enquiry

Pentest Programmer- QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for Pentest Programmer | 10 Endorsed Certificates Included | Life Time Access

Pentest Programmer- QLS Endorsed Bundle
Delivered Online On Demand
£599

Digital Forensics for Pentesting Course

4.3(43)

By John Academy

Course Overview Won't it be great if you could recover your lost data from your device or ensure that the hackers cannot reach you? What about tracking the hacker and get back the data they have stolen from you? Digital security has become one of the greatest concerns today. Learn how you can secure your device and find out black hat hacker criminals from this Digital Forensics for Pentesting Course and ensure data security. In this Digital Forensics for Pentesting Course, you will learn the importance of digital forensic investigation, the basics of cybersecurity, pentesting and digital forensic. You'll understand the functions of Malware and how to track them back. This course is ideal for understanding how digital devices can be hacked and how to prevent them. You will be able to understand digital forensic investigation steps with easily understandable and bite-sized lessons. Learning Outcomes Get a clear understanding of what digital forensic investigation is Be able to produce professional and legal digital forensic reports Learn to utilise various forensic tools for digital forensic investigation Properly handle digital media during the investigation Recover deleted data from various devices and operating systems Be able to track hackers malicious movement Who is this course for? This course will be helpful for anyone who wants to learn about pentesting and interested in digital forensic investigation. You will learn how to understand digital forensic investigation step by step from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Digital Forensics for Pentesting Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Digital Forensic Investigators Pentesters Data Security Officers White Hat Hackers Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Lab - Installing CSI Linux 00:13:00 Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Lab - Create a Virtual Install Kali Image Using VirtualBox 00:07:00 Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Install Additional Tool Using Katoolin3 00:10:00 Using Kali Forensic Mode and Autopsy Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Lab -Digital Forensics Using Autopsy Part I 00:11:00 Lab - Digital Forensics Using Autopsy Part II 00:07:00 Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source intelligence (OSINT) Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Lab - Find Social Media Accounts Using Sherlock 00:07:00 Computer Forensics Attaching an External USB Device in Kali 00:07:00 Lab - Memory Forensics Using the Volatility Framework 00:18:00 Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Lab - Analyzing the Windows Registry for Evidence 00:14:00 Using Shodan to Search for Vulnerable devices Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Stenography Lab - Using the EXIFtool to Read and Write EXIF Tags 00:11:00 Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network forensics Using Wireshark Overview of Wireshark 3.2 00:11:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:04:00 Lab - Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Lab - Installing a Wireless Adapter in Kali 00:09:00 Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Have learned Lab - CTF Lab Build for HA: Forensics 00:11:00 Lab - Capture flag #1 00:12:00 Lab - Capture flag #2 00:10:00 Lab - Capture flag #3 00:20:00 Lab - Capture flag #4 00:09:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Digital Forensics for Pentesting Course
Delivered Online On Demand5 hours 39 minutes
£11.99

Ransomware Uncovered: Cybersecurity Threats & Solutions

4.3(43)

By John Academy

Explore the intricate world of cyber threats with our course, 'Ransomware Uncovered: Cybersecurity Threats & Solutions.' Gain insights into the evolving threat landscape, the underground economy of cybercriminals, and the cyber kill chain. Understand the mechanics of ransomware, delivery channels, and the psychological tactics employed by criminals. Learn to make informed decisions on whether to pay ransoms. Develop robust defense strategies and incident response plans. Empower yourself in the fight against cyber threats. Enroll now for a comprehensive journey into ransomware defense and cybersecurity resilience.

Ransomware Uncovered: Cybersecurity Threats & Solutions
Delivered Online On Demand2 hours
£23.99

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry