• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1311 Courses delivered Online

Spill Management Training Course

By NextGen Learning

Overview By enroling in Spill Management Training, you can kickstart your vibrant career and strengthen your profound knowledge. You can learn everything you need to know about the topic. The Spill Management Training course includes all of the most recent information to keep you abreast of the employment market and prepare you for your future. The curriculum for this excellent Spill Management Training course includes modules at all skill levels, from beginner to expert. You will have the productivity necessary to succeed in your organisation once you have completed our Spill Management Training Program. So enrol in our Spill Management Training course right away if you're keen to envision yourself in a rewarding career. Description Enroling in this Spill Management Training course can improve your Spill Management Training perspective, regardless of your skill levels in the Spill Management Training topics you want to master. If you're already a Spill Management Training expert, this peek under the hood will provide you with suggestions for accelerating your learning, including advanced Spill Management Training insights that will help you make the most of your time. This Spill Management Training course will act as a guide for you if you've ever wished to excel at Spill Management Training. Why Choose Us? This course is accredited by the CPD Quality Standards. Lifetime access to the whole collection of the learning materials. Online test with immediate results. Enroling in the course has no additional cost. You can study and complete the course at your own pace. Study for the course using any internet-connected device, such as a computer, tablet, or mobile device. Will I Receive A Certificate Of Completion? Upon successful completion, you will qualify for the UK and internationally-recognised CPD certificate and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £4.99 and Hardcopy Certificate for £9.99. Who Is This Course For? This Spill Management Training course is a great place to start if you're looking to start a new career in Spill Management Training field. This training is for anyone interested in gaining in-demand Spill Management Training proficiency to help launch a career or their business aptitude.  Requirements The Spill Management Training course requires no prior degree or experience. All you require is English proficiency, numeracy literacy and a gadget with stable internet connection. Learn and train for a prosperous career in the thriving and fast-growing industry of Spill Management Training, without any fuss. Career Path This Spill Management Training training will assist you develop your Spill Management Training ability, establish a personal brand, and present a portfolio of relevant talents. It will help you articulate a Spill Management Training professional story and personalise your path to a new career. Furthermore, developing this Spill Management Training skillset can lead to numerous opportunities for high-paying jobs in a variety of fields. Order Your Certificate To order CPD Quality Standard Certificate, we kindly invite you to visit the following link: Course Curriculum Module 01: Introduction to Spill Management Introduction to Spill Management 00:24:00 Module 02: Hazardous Substances Hazardous Substances 00:23:00 Module 03: Pollution Incident Response Planning Pollution Incident Response Planning 00:11:00 Module 04: Managing a Spill Managing a Spill 00:38:00 Module 05: Spill Clean-Up Guideline Spill Clean-Up Guideline 00:17:00 Module 06: Spills on a Road or Highway Spills on a Road or Highway 00:14:00 Module 07: Diesel Spillages: An Overview Diesel Spillages An Overview 00:22:00 Module 08: Site-Specific Pollution Control Options Site-Specific Pollution Control Options 00:12:00 Module 09: Spill Prevention & Control Checklist Spill Prevention & Control Checklist 00:14:00 Module 10: Ways to Encourage Best Practice Ways to Encourage Best Practice 00:13:00 Mock Mock Exam - Spill Management Training 00:20:00 Final Final Exam - Spill Management Training 00:20:00 Order Your Certificate Order Your Certificate 00:00:00

Spill Management Training Course
Delivered Online On Demand3 hours 48 minutes
£20

Certificate in Social Intelligence

4.3(43)

By John Academy

Description: Social Intelligence is about Comprehending your environment as well as having a positive impact. This Certificate in Social Intelligence will give you the understanding, skills and confidence to connect better with people. It will help you master the two crucial communication skills at the heart of social intelligence. You will become more confident in your particular social Circumstances by learning how to express as well as interpret social cues. This course will greatly enhance your ability to build successful relationships.  Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certificate in Social Intelligence is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certificate in Social Intelligence is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Getting Started 00:05:00 Increase Your Self Awareness 00:25:00 The Keys to Empathy 00:25:00 Active Listening 00:20:00 Insight on Behavior 00:20:00 Communication 00:25:00 Social Cues (I) 00:20:00 Social Cues (II) 00:25:00 Conversation Skills 00:20:00 Body Language 00:25:00 Building Rapport 00:20:00 Wrapping Up 00:05:00 Mock Exam Mock Exam- Certificate in Social Intelligence 00:20:00 Final Exam Final Exam- Certificate in Social Intelligence 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certificate in Social Intelligence
Delivered Online On Demand4 hours 35 minutes
£18

Web Application Secure Programming

By NextGen Learning

Ignite your dynamic career and strengthen your deep insight knowledge by signing up for Web Application Secure Programming. This course is the ideal approach for you to obtain a thorough understanding and knowledge of the subject. We are concerned about the progression of your career. Therefore, after conducting extensive studies and consulting with experienced personnel, we formulated this outstanding Web Application Secure Programming course to improve your pertinent skills. In this easy-to-digest course, you will get exclusive training, which will enable you to stand out in this competitive market. However, the course covers all of the recent materials in order to keep you up to date with the job market and make you a good fit for your career. This top-notch Web Application Secure Programming course curriculum comprises basic to advanced levels of modules that will increase your skill sets. After completing this programme, you will attain the productivity to succeed in your organisation. So, if you are eager to see yourself in a gratifying career, then enrol in the course today! What will Make You Stand Out? On completion of this Web Application Secure Programming online course, you will gain: CPD QS Accredited course After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials. Enroling in the Course has no additional cost. 24x7 Tutor Support You can study and complete the course at your own pace. Course Curriculum Web Application Secure Programming Section 01: What You Need to Know Section 02: Introducing the Cloud Section 03: System Requirements for Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating to the Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Show off your new skills with a certificate of completion. After successfully completing the course, you can order your CPD Accredited Certificates as proof of your achievement absolutely free. Please Note: The delivery charge inside the U.K. is £4.99, and international students have to pay £8.99. CPD 15 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Course the Right Option for You? This Web Application Secure Programming course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. Requirements Without any formal requirements, you can delightfully enrol in this Web Application Secure Programming course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this course at your own pace. Career path The aim of this exclusive Web Application Secure Programming course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Web Application Secure Programming
Delivered Online On Demand11 hours
£19

IT Administrator Diploma

4.3(43)

By John Academy

As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology. Description In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately. Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job. There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Software: What is an Operating System FREE 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:10:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle FREE 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Networking: OSI Layers FREE 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 00:59:00 Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT FREE 00:06:00 EMR EHR Issues 00:04:00 Regulations, Standards, and Stakeholders 00:13:00 HIPAA Controls and Compliance 00:07:00 Roles and Responsibilities 00:09:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:32:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:19:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:07:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:14:00 Perform Backups and Disaster Recovery 00:18:00 Mock Exam Mock Exam- IT Administrator Diploma 00:30:00 Final Exam Final Exam- IT Administrator Diploma 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

IT Administrator Diploma
Delivered Online On Demand48 hours
£14.99

Secure Programming of Web Applications

5.0(10)

By Apex Learning

Overview This comprehensive course on Secure Programming of Web Applications will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Secure Programming of Web Applications comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Secure Programming of Web Applications. It is available to all students, of all academic backgrounds. Requirements Our Secure Programming of Web Applications is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 3 sections • 18 lectures • 01:14:00 total length •Introduction and motivation: 00:02:00 •Well-known Vulnerabilities Overview: 00:02:00 •Causes & Background: 00:09:00 •Secure Programming in general: 00:03:00 •Code/Command Injection: 00:03:00 •(No)SQL Code Injection: 00:04:00 •Cross-Site Request Forgery (CSRF): 00:05:00 •Cross-Site Scripting (XSS): 00:05:00 •Open Redirection: 00:04:00 •File Inclusion / Directory Traversal: 00:05:00 •Clickjacking: 00:04:00 •Session-Hijacking: 00:07:00 •Information Disclosure: 00:03:00 •Authentification: 00:07:00 •Denial of Service: 00:05:00 •Middleware: 00:01:00 •Third-Party Software: 00:01:00 •Conclusion and Summary: 00:04:00

Secure Programming of Web Applications
Delivered Online On Demand1 hour 14 minutes
£12

ITIL Practitioner

5.0(10)

By Apex Learning

Overview This comprehensive course on ITIL Practitioner will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This ITIL Practitioner comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this ITIL Practitioner. It is available to all students, of all academic backgrounds. Requirements Our ITIL Practitioner is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 9 sections • 52 lectures • 07:37:00 total length •Course Introduction!: 00:14:00 •Learning Objectives: 00:06:00 •Selecting a Management System: 00:11:00 •Systems Thinking: 00:13:00 •The 4Ps: 00:14:00 •Communication & Management Systems: 00:14:00 •Organizational Capabilities: 00:10:00 •Adopt, Adapt & Realize: 00:15:00 •Outside-in vs Inside-out Thinking: 00:11:00 •Defining a Service: 00:05:00 •Metrics & Measurement: 00:07:00 •Improvement, the Practitioner & CSI: 00:10:00 •Driving IT Service Management Summary: 00:15:00 •Checkpoint: 00:16:00 •Learning Objectives: 00:04:00 •Principles: 00:24:00 •Themes: 00:09:00 •Principles & Themes in Practice: 00:08:00 •Principles & Themes Summary: 00:03:00 •Checkpoint: 00:07:00 •Learning Objectives: 00:02:00 •Role & Impact of OCM on Improvement: 00:07:00 •OCM Activities: 00:16:00 •OCM & Systems Thinking: 00:06:00 •OCM Summary: 00:05:00 •Checkpoint: 00:10:00 •Learning Objectives: 00:01:00 •Value, Importance & Benefit of Good Communication: 00:05:00 •Principles of Communication: 00:11:00 •Role of Influence: 00:07:00 •Communication Summary: 00:05:00 •Checkpoint: 00:09:00 •Learning Objectives: 00:02:00 •CSFs, KPIs & Improvement: 00:18:00 •Analyze CSFs & KPIs in Context: 00:09:00 •Assessments: 00:04:00 •Use Metrics & Measurement Summary: 00:05:00 •Design a Report: 00:07:00 •Checkpoint: 00:08:00 •Learning Objectives: 00:02:00 •It Depends: 00:09:00 •Approach Deconstructed: 00:25:00 •Goal Question Metric (GQM) Approach Introduction: 00:08:00 •CSI Approach Summary: 00:05:00 •Checkpoint: 00:07:00 •Learning Objectives: 00:01:00 •CSI Approach for the ITIL Practitioner: 00:07:00 •CSI Approach in ITIL: 00:25:00 •CSI Approach, PRINCE2 & RESILIA: 00:06:00 •Integrating CSI with ITIL & Beyond Summary: 00:03:00 •Checkpoint: 00:06:00 •Workbooks - ITIL Practitioner - Video Training Course: 00:00:00

ITIL Practitioner
Delivered Online On Demand7 hours 37 minutes
£12

Computer Networks Security

5.0(10)

By Apex Learning

Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00

Computer Networks Security
Delivered Online On Demand8 hours 8 minutes
£12

CompTIA Security+ (SY0-601)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

CompTIA Security+ (SY0-401)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-401) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-401) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-401). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-401) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 41 lectures • 16:59:00 total length •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •Configure Security Parameters on Network Devices and Technologies: 00:49:00 •Network Design Elements and Components: 00:26:00 •Implement Networking Protocols and Services: 01:09:00 •Apply Secure Network Administration Principles: 00:12:00 •Secure Wireless Traffic: 00:31:00 •Access Control and Authentication Services: 00:43:00 •Implement Account Management Security Controls: 00:33:00 •Install a CA Hierarchy: 00:26:00 •Enroll Certificates: 00:13:00 •Secure Network Traffic by Using Certificates: 00:04:00 •Renew Certificates: 00:01:00 •Back Up and Restore Certificates and Private Keys: 00:06:00 •Revoke Certificates: 00:08:00 •Physical Security: 00:20:00 •Legal Compliance: 00:10:00 •Security Awareness and Training: 00:11:00 •Integrate Systems and Data with Third Parties: 00:09:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:23:00 •Recover from a Security Incident: 00:10:00 •Business Continuity: 00:18:00 •Plan for Disaster Recovery: 00:17:00 •Execute DRPs and Procedures: 00:13:00

CompTIA Security+ (SY0-401)
Delivered Online On Demand16 hours 59 minutes
£12

Network Security Level 2

5.0(10)

By Apex Learning

Course Overview: Did you know 70% of organisations reported a cybersecurity breach last year? Network Security Level 2 is more than just a course; it invests in a safer digital future. This curriculum offers a meticulous journey, delving deeper into network security. From understanding the intricacies of Security and Risk Management to Security Operations, this course ensures comprehensive coverage. Whether you're keen on mastering Asset Security, seeking profound knowledge in Security Engineering, or aiming to understand the dynamics of Communication and Network Security, Identity and Access Management, Security Assessment and Testing, or Software Development Security, this course is tailored to equip you with the advanced knowledge necessary for the cybersecurity challenges of tomorrow. Take action now. Stay ahead of the curve, safeguard sensitive data, and become a beacon of trust in cybersecurity. Enrol today! Key Features of the Course: Awarded a CPD certificate upon completion. 24/7 Learning Assistance to ensure uninterrupted progress. Engaging learning materials designed by top industry experts. Who is This Course For? This Network Security Level 2 course is Ideal for professionals who have completed foundational courses in network security and are looking to further enhance their skills and knowledge. Learning Outcome Acquire an in-depth understanding of security protocols. Delve into Security and Risk Management. Understand the essence of Asset Security. Engineer robust security measures. Master Communication and Network Security. Manage Identity and Access effectively. Conduct Security Assessment and Testing proficiently. Implement efficient Security Operations. Secure software through development practices. Why Enrol in This Course: Stay ahead in the cybersecurity realm. This top-reviewed course, recently updated, is trending and empowers you with the skills to counteract the ever-evolving world of network threats. Requirements: Basic knowledge of network security principles. Completion of a foundational course in network security or equivalent experience. Career Path: Upon completion of this Network Security Level 2 course, professionals can explore numerous roles, such as: Security Analyst: £50,000 Network Security Engineer: £55,000 Cybersecurity Manager: £65,000 Security Consultant: £60,000 Information Security Officer: £58,000 Threat Intelligence Analyst: £53,000 Cybersecurity Architect: £62,000 Certification: Students will be awarded a CPD certificate upon successful completion, recognising their advanced Network Security Level 2 proficiency. FAQ What is Level 3 cyber security? Level 3 cyber security refers to a qualification or course that provides an advanced understanding of cybersecurity principles and practices. It is often designed for individuals with foundational cybersecurity knowledge who want to deepen their expertise. What are the 5 types of network security? The five types of network security are: Firewalls, which prevent unauthorised access to or from a private network; Antivirus and anti-malware software, which protect against malicious software; Intrusion Prevention Systems (IPS), which identify and prevent known threats; Virtual Private Networks (VPNs) which provide secure remote access; and Data Loss Prevention (DLP) prevents sensitive data from leaving the network. What is BTEC Level 2 cyber security? BTEC Level 2 cyber security is a qualification that provides an introduction to the principles and practices of cybersecurity. It is typically designed for individuals new to the field and seeking foundational knowledge. What is OCN NI Level 2 cybersecurity? OCN NI Level 2 cybersecurity is a qualification offered by the Open College Network Northern Ireland. It provides a foundational understanding of cybersecurity principles and practices and is designed for individuals new to the field. What is OCN Level 2 equivalent to? OCN Level 2 is equivalent to a GCSE grade A*-C or a Level 2 NVQ. An intermediate-level qualification provides a foundation in a specific subject area. What is OCN Level 2 qualification? OCN Level 2 qualification is an intermediate-level qualification that provides a foundational understanding of a specific subject area. It is typically designed for individuals who have completed basic education and seek to further their knowledge and skills. Course Curriculum 2 sections • 9 lectures • 02:12:00 total length •Security and Risk Management: 00:24:00 •Asset Security: 00:12:00 •Security Engineering: 00:15:00 •Communication and Network Security: 00:10:00 •Identity and Access Management: 00:10:00 •Security Assessment and Testing: 00:12:00 •Security Operations: 00:36:00 •Software Development Security: 00:13:00 •Assignment - Network Security Level 2: 00:00:00

Network Security Level 2
Delivered Online On Demand2 hours 12 minutes
£12