• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1416 Courses delivered Online

Total MPLS VPN for engineers

5.0(3)

By Systems & Network Training

Total MPLS VPN for engineers training course description A hands on course concentrating solely on MPLS VPNs. The course begins with a review of VPN basics before moving onto L3VPNs and MBGP, followed by L2VPNs. What will you learn Compare, contrast and evaluate MPLS L2VPNs versus L3VPNs. Describe, configure and troubleshoot MPLS L3VPNs. Configure and troubleshoot MBGP. Describe, configure and troubleshoot MPLS L2VPNs. Total MPLS VPN for engineers training course details Who will benefit: Anyone working with MPLS VPNs. Prerequisites: Concise MPLS for engineers Duration 2 days Total MPLS VPN for engineers training course contents MPLS VPN basics LSR, PE and P router roles. What is a VPN? MPLS VPN types, MPLS VPN comparison, MPLS L3VPN, L2VPN. VPN architectures. Hands on: Building the base network. L3VPN Separate routing tables, The Virtual Routing Table, VRFs, Route Distinguisher (RD), VNPv4 addresses. Hands on: Minimal VRF configuration, routing between customer and provider (PE-CE). MBGP MP-BGP, IPv4 routing, IPv6 routing, VPNv4 addresses, VPNv6 addresses. Exchanging labels. Exchanging routes. Route targets, communities. Route reflectors. Hands on: MBGP setup. MPLS L3VPN troubleshooting. L2VPN Why L2 not L3? Services: TDM, ATM, Frame Relay, Ethernet. Pseudowires. Hands on: Simple L2VPN configuration. Pseudowires VPWS, AToM, Attachment Circuit, Traffic encapsulation, Ethernet over MPLS. Ethernet MTU considerations. VC types. Hands on: PW configuration and troubleshooting. VPLS Ethernet multipoint connectivity. Virtual Forwarding Instance (VFI), Virtual Switching Instance. Flooding, MAC address management, split horizons. Hierarchical VPLS. Signalling: LDP based. BGP based. Auto discovery. Hands on: VPLS configuration and troubleshooting. Next generation L2VPN E-VPN, PBB-EVPN.

Total MPLS VPN for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive network virtualization

5.0(3)

By Systems & Network Training

Network virtualization training course description This course covers network virtualization. It has been designed to enable network engineers to recognise and handle the requirements of networking Virtual Machines. Both internal and external network virtualization is covered along with the technologies used to map overlay networks on to the physical infrastructure. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer implementations. What will you learn Evaluate network virtualization implementations and technologies. Connect Virtual Machines with virtual switches. Explain how overlay networks operate. Describe the technologies in overlay networks. Network virtualization training course details Who will benefit: Engineers networking virtual machines. Prerequisites: Introduction to virtualization. Duration 2 days Network virtualization training course contents Virtualization review Hypervisors, VMs, containers, migration issues, Data Centre network design. TOR and spine switches. VM IP addressing and MAC addresses. Hands on VM network configuration Network virtualization What is network virtualization, internal virtual networks, external virtual networks. Wireless network virtualization: spectrum, infrastructure, air interface. Implementations: Open vSwitch, NSX, Cisco, others. Hands on VM communication over the network. Single host network virtualization NICs, vNICs, resource allocation, vSwitches, tables, packet walks. vRouters. Hands on vSwitch configuration, MAC and ARP tables. Container networks Single host, network modes: Bridge, host, container, none. Hands on Docker networking. Multi host network virtualization Access control, path isolation, controllers, overlay networks. L2 extensions. NSX manager. OpenStack neutron. Packet walks. Distributed logical firewalls. Load balancing. Hands on Creating, configuring and using a distributed vSwitch. Mapping virtual to physical networks VXLAN, VTEP, VXLAN encapsulation, controllers, multicasts and VXLAN. VRF lite, GRE, MPLS VPN, 802.1x. Hands on VXLAN configuration. Orchestration vCenter, vagrant, OpenStack, Kubernetes, scheduling, service discovery, load balancing, plugins, CNI, Kubernetes architecture. Hands on Kubernetes networking. Summary Performance, NFV, automation. Monitoring in virtual networks.

Definitive network virtualization
Delivered in Internationally or OnlineFlexible Dates
£1,727

Essential OTN

5.0(3)

By Systems & Network Training

Essential OTN training course description An In-depth introduction to the terminology and technology that will comprise tomorrow's Optical Transport Networks. What will you learn Describe the problems with old technologies. Identify the purpose of new technologies. Describe the functionality of the various transmission mediums available Identify OTN features and functionality. Define the issues involved in equipment and application rollout. Essential OTN training course details Who will benefit: Anyone wishing to learn OTN. Prerequisites: SDH foundation or Essential DWDM Duration 2 days Essential OTN training course contents Scope, References Terms and definitions, Abbreviations and Conventions Optical transport network interface structure Multiplexing/mapping principles and bit rates Optical transport module (OTM-n.m, OTM-nr.m, OTM-0.m and OTN 0.mvn) Physical specification of the ONNI Optical channel (OCh) Optical channel transport unit (OTU) Optical channel data unit (ODU) Optical channel payload unit (OPU) OTM overhead signal (OOS) Overhead description and maintenance signals Mapping of client signals and concatenation Mapping ODUk signals into the ODTUjk signal Forward error correction using 16-byte interleaved RS (255,239) codecs ODUk tandem connection monitoring (TCM) overhead OPUk Multiplex Overhead Amendment 2 including: OTN Multiplexing and Mapping, Basic signal structure, ODTU12, ODTU13, ODTU23, OPUk Multiplex Overhead, OPUk Multiplex Structure Identifier (MSI). OPU2 Multiplex Structure Identifier (MSI), OPU3 Multiplex Structure Identifier (MSI), OPUk Payload Structure Identifier Reserved overhead (RES), ODU1 into ODU2 multiplexing, ODU2 into ODU3 multiplexing, ODU1 into ODU3 multiplexing Amendment 3 including: 40 Gbit/s ODU3/OTU3 and 100 Gbit/s ODU4/OTU4, Support of gigabit Ethernet services via ODU0, ODU2e, ODU3 and ODU4, ODU0 and ODUFlex, Multi-lane OTU3 and OTU4 interfaces, Support for InfiniBand Amendment 4 including: OTSn OTN synchronization messaging channel (OSMC) overhead, FC-1600 Amendment 5 Including: ODUk.ts, OTU0LL (OTU0 low latency), OTSiA (optical tributary signal assembly). OTSiG (optical tributary signal group), OTSiG-O (optical tributary signal overhead), CMEP (connection monitoring end- point), CMOH (connection monitoring overhead), MOTU (Multi-OUT), MOTUm (Multi-OTU with management), OTUCn-M (Optical Transport Unit-Cn, with n OxUC overhead instances and 5G tributary slots). SOTU (Single-OUT). SOTUm (Single-OTU with management). Modified bit rates and capacity for OTU1/2/3/4 OTM.nr.m, OTM.n.m, OTM.0.3v4, OTM 0.4v4 Mapping of CBR2G5, CBR10G, CBR10G3 and CBR40G signals into OPUk 64B/66B and 513B block code format PCS lane alignment marker for 40GBASE-R and 100GBASE-R PT=20/PT=21 and AMP/GMP options OTL 4.10 to OTL 4.4 gearbox ODU switching and Line protection Schemes 10 x 10 MSA Overview of current and future coherent and noncoherent technologies 40Gbit and 100Gbit compliant ROADM's Implementers Guide including replacement terms. Differing vendor's equipment and their implementations Individual and group planning exercises: Upgrade a customer STM-64/10G network to a 40G/ OTN network. Upgrade a customer old 16 Wavelength WDM network to be OTN compliant. Implement a new customer 40 wavelength OTU3 OTN compliant MSPP (DWDM) network. Design a cost-effective solution where we can hand over circuits using 'Optical Transport Lanes'.

Essential OTN
Delivered in Internationally or OnlineFlexible Dates
£1,727

Total IS-IS for engineers

5.0(3)

By Systems & Network Training

IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering

Total IS-IS for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Essential IP addressing and subnetting

5.0(3)

By Systems & Network Training

IP addressing and subnetting course description A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. What will you learn Download and install Wireshark. Calculate subnet numbers in seconds Design IP addressing schemes. Troubleshoot IP address problems. Calculate CIDR prefixes in seconds IP addressing and subnetting course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IP addressing and subnetting course contents IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.

Essential IP addressing and subnetting
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive Kubernetes for engineers

5.0(3)

By Systems & Network Training

Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.

Definitive Kubernetes for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Oracle SQL Advanced

5.0(3)

By Systems & Network Training

Oracle SQL Advanced training course description The Oracle SQL Advanced course is designed to give delegates practical experience in using some of the more advanced features of Oracle SQL. Additional datatypes and the use of advanced SQL functions and expressions are covered together with enhanced table handling features. What will you learn Retrieve data using correlated subqueries, in-line views and multi-column subqueries. Use the WITH Clause. Inserting and Updating Rows Using Complex Subqueries Create Hierarchical Queries. Use ROLLUP, CUBE and GROUPING SETS group by enhancements. Implement the GROUPING and GROUPING_ID functions. Manage large data sets. Insert data conditionally and unconditionally. Merge Rows in a Table. Create TIMESTAMP and INTERVAL Datatypes. Use TIMESTAMP, TIMEZONE and INTERVAL functions and literals. Use regular expressions and implement related functions. Manage objects with the data dictionary. Manage schema objects. Perform flashback operations. Create and using external tables. Control user access to database objects. Oracle SQL Advanced training course details Who will benefit: Anyone who needs to use the more advanced features of SQL to improve their productivity in querying and updating an Oracle database. Prerequisites: Delegates should have attended the Oracle SQL course or have a similar level of experience. Duration 2 days Oracle SQL Advanced training course contents Retrieve data using subqueries ANY, ALL or SOME operators, Correlated subqueries, In-Line views, The Exists operator, The WITH clause, Multi-Column subqueries, Insert and update using a query, Correlated update and delete. Hierarchical queries Hierarchical data, The START WITH and CONNECT BY clauses, The LEVEL pseudo-column, Sequencing the output, Eliminating nodes and branches. Enhanced grouping features Review of basic grouping concepts, The ROLLUP and CUBE extensions, The GROUPING SETS extension, Using the GROUPING and GROUPING_ID functions. Manage large data sets Multi-table Inserts, Conditional and unconditional Inserts, Merging data into a table, Table and view based merge, A sub query based merge. Flashback technology Flashback query, The AS clause, Flashback table, Flashback drop. Date, time and time zone support Date, Timestamp and Interval datatypes, Handling dates and times, Handling intervals, Date, timestamp and interval functions and literals, Related NLS parameters. Regular expression support Regular expression notation, Character matching, Repetition operators, Sub expression grouping, Regular expression functions. Manage objects with the Data Dictionary The Data Dictionary, Useful Data Dictionary tables, Using the Data Dictionary. Manage schema objects Column operations, Constraint operations, Creating and dropping Indexes, B-Tree indexes, Function based indexes, Descending indexes, Creating and using external tables. Access control System privileges and roles, Create users, Alter user details, Grant and revoke object privileges.

Oracle SQL Advanced
Delivered in Internationally or OnlineFlexible Dates
£1,727

Criminal Intelligence Analyst

By Training Tale

Criminal Intelligence Analyst Introducing the Comprehensive Criminal Intelligence : Criminal Intelligence Analyst Course: Unlocking the Secrets of Crime Investigation! Are you fascinated by the intricate workings of criminal minds? Do you have a passion for unravelling complex mysteries and making the world a safer place? If so, Welcome to our exclusive Criminal Intelligence Analyst course. Our Criminal Intelligence Analyst course is designed to equip you with the knowledge, skills, and techniques needed to excel in this exciting field. Whether you are an aspiring analyst seeking to kickstart your career or a seasoned professional looking to enhance your expertise, this Criminal Intelligence Analyst course is tailored for you. Our Criminal Intelligence Analyst course covers a wide range of topics, ensuring you gain a holistic understanding of the criminal intelligence analysis process. This Criminal Intelligence : Criminal Intelligence Analyst course will also provide you knowledge about Criminal Psychology. Our Criminal Intelligence : Criminal Intelligence Analyst course is entirely online. Study at your own pace, from anywhere in the world, and access our comprehensive Criminal Intelligence Analyst course materials 24/7. You will have lifetime access to the content, allowing you to revisit and reinforce your knowledge whenever needed. Upon successful completion of the Criminal Intelligence Analyst course, you will receive a prestigious Criminal Intelligence Analyst Certification. This industry-recognized credential will validate your expertise and set you apart from the competition. Don't miss out on this opportunity to embark on a rewarding and fulfilling career in criminal intelligence. Enrol today in our Criminal Intelligence Analyst course and unlock the doors to a world of crime-solving possibilities. Other benefits of Criminal Intelligence Analyst course Free PDF Certificate Lifetime Access Free Retake Exam Tutor Support [ Note: Free PDF certificate as soon as completing the Criminal Intelligence : Criminal Intelligence Analyst course] Criminal Intelligence : Criminal Intelligence Analyst Course Curriculum of Criminal Intelligence Analyst Module 1: An Introduction to Intelligence Module 2: The Intelligence Process Module 3: Example of a National Intelligence Model: The United Kingdom Module 4: Evaluation of Source and Data Module 5: Analysis and Analytical Process Module 6: Intelligence-Led Policing Module 7: Decision Making in Criminal Intelligence Analysis Module 8: Criminal Psychology Module 9: The Criminal Justice System in England and Wales Assessment Method of Criminal Intelligence Analyst Training After completing each module of the Criminal Intelligence : Criminal Intelligence Analyst course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification of Criminal Intelligence Analyst After completing the MCQ/Assignment assessment for this Criminal Intelligence : Criminal Intelligence Analyst course, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. The certificate is in PDF format, which is completely free to download. Who is this course for? Criminal Intelligence : Criminal Intelligence Analyst This Criminal Intelligence Analyst course is ideal for anyone. Requirements Criminal Intelligence : Criminal Intelligence Analyst There are no specific requirements for this Criminal Intelligence Analyst course because it does not require any advanced knowledge or skills. Career path Criminal Intelligence : Criminal Intelligence Analyst

Criminal Intelligence Analyst
Delivered Online On Demand4 hours
£12

Intelligence Analyst Certification

By Online Training Academy

Are you ready to dive into the world of intelligence analysis and make a significant impact in national security and beyond? Our comprehensive Intelligence Analyst Certification is designed to equip you with the essential skills and knowledge needed to excel in this critical field. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access In the Intelligence Analyst Certification course, learners delve into the fundamental aspects of intelligence analysis. They start by understanding the essence of intelligence analysis, its historical evolution, and current best practices. The course emphasizes the intelligence cycle, teaching how information is gathered, processed, and disseminated to support decision-making. Participants learn about their roles and responsibilities as analysts, honing critical thinking skills and techniques for organizing information effectively. Legal and ethical considerations in intelligence operations are also covered, ensuring analysts understand boundaries and responsibilities in their work. Lastly, the course explores the broader context of intelligence in national security, highlighting its importance and impact on policies and strategies. Overall, learners gain comprehensive knowledge and skills necessary to perform effectively as intelligence analysts in various professional settings. Course Curriculum Module 01: Introduction to the Course Module 02: Defining Intelligence Analysis Module 03: Development of Intelligence Analysis Module 04: Intelligence Analysis and Best Practice Module 05: The Intelligence Cycle Module 06: Your Role, Responsibilities, and Functions as an Analyst Module 07: Critical Thinking and Structuring Module 08: Legal Issues and Ethics Module 09: Intelligence and National Security Learning Outcomes: Understand the fundamentals of Intelligence Analysis and its historical evolution. Apply critical thinking techniques to structure intelligence reports effectively. Comprehend legal and ethical considerations in the context of intelligence operations. Demonstrate proficiency in the Intelligence Cycle and its application in practice. Identify roles, responsibilities, and functions within the scope of intelligence analysis. Analyse the relationship between intelligence and national security issues. CPD 10 CPD hours / points Accredited by CPD Quality Standards Intelligence Analyst Certification 2:29:21 1: Module 01: Introduction to the Course 01:52 2: Module 02: Defining Intelligence Analysis 17:29 3: Module 03: Development of Intelligence Analysis 18:04 4: Module 04: Intelligence Analysis and Best Practice 25:15 5: Module 05: The Intelligence Cycle 12:19 6: Module 06: Your Role, Responsibilities, and Functions as an Analyst 21:28 7: Module 07: Critical Thinking and Structuring 17:12 8: Module 08: Legal Issues and Ethics 17:40 9: Module 09: Intelligence and National Security 17:02 10: CPD Certificate - Free 01:00 Who is this course for? Individuals aspiring to work in intelligence-related governmental departments. Professionals seeking to enhance their analytical skills in national security contexts. Graduates aiming to start a career in intelligence analysis roles. Military personnel transitioning to civilian intelligence roles. Law enforcement officers interested in intelligence gathering and analysis. Career path Intelligence Analyst Counterintelligence Officer Risk Assessment Analyst Security Intelligence Specialist National Security Analyst Cyber Intelligence Analyst Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Intelligence Analyst Certification
Delivered Online On Demand3 minutes
£12

Security Analyst Training

By Online Training Academy

Are you ready to dive into the world of cybersecurity and become a skilled Security Analyst? Our Security Analyst Training course is meticulously designed to provide you with the knowledge and expertise needed to protect and defend against the ever-evolving threat landscape. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access The Security Analyst Training course provides a comprehensive understanding of the role and responsibilities of a security analyst. Learners will explore the current threat landscape, identifying and assessing risks that organizations face. The course covers various types and phases of penetration testing, offering hands-on experience in identifying vulnerabilities. Participants will learn about key methodologies and guidelines for maintaining security, as well as the importance of policies and procedures. The curriculum also includes auditing techniques for vulnerability assessments and penetration tests, and interpreting the results of these tests to enhance security measures. By the end of the course, learners will have practical skills and knowledge to effectively protect and secure organizational systems. Course Curriculum Module 01: What is a Security Analyst - Part 1 Module 02: What is a Security Analyst - Part 2 Module 03: What is a Security Analyst - Part 3 Module 04: Threat Landscape - Part 1 Module 05: Threat Landscape - Part 2 Module 06: Threat Landscape - Part 3 Module 07: Risk Assessment - Part 1 Module 08: Risk Assessment - Part 2 Module 09: Risk Assessment - Part 3 Module 10: Types and Phases of Penetration Testing - Part 1 Module 11: Types and Phases of Penetration Testing - Part 2 Module 12: Types and Phases of Penetration Testing - Part 3 Module 13: Methodologies and Guidelines - Part 1 Module 14: Methodologies and Guidelines - Part 2 Module 15: Methodologies and Guidelines - Part 3 Module 16: Policies and Procedures - Part 1 Module 17: Policies and Procedures - Part 2 Module 18: Policies and Procedures - Part 3 Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 Module 22: Penetration Testing Results - Part 1 Module 23: Penetration Testing Results - Part 2 Module 24: Penetration Testing Results - Part 3 Learning Outcomes: Understand roles and responsibilities of a security analyst. Identify current and emerging threats in the threat landscape. Conduct comprehensive risk assessments and risk management. Execute penetration tests through various types and phases. Apply methodologies and guidelines in security analysis. Develop and implement security policies and procedures. CPD 10 CPD hours / points Accredited by CPD Quality Standards Security Analyst Training 4:06:52 1: Module 01: What is a Security Analyst - Part 1 Preview 00:29 2: Module 02: What is a Security Analyst - Part 2 00:24 3: Module 03: What is a Security Analyst - Part 3 42:38 4: Module 04: Threat Landscape - Part 1 00:26 5: Module 05: Threat Landscape - Part 2 00:32 6: Module 06: Threat Landscape - Part 3 16:07 7: Module 07: Risk Assessment - Part 1 00:34 8: Module 08: Risk Assessment - Part 2 00:38 9: Module 09: Risk Assessment - Part 3 23:01 10: Module 10: Types and Phases of Penetration Testing - Part 1 00:28 11: Module 11: Types and Phases of Penetration Testing - Part 2 00:32 12: Module 12: Types and Phases of Penetration Testing - Part 3 27:37 13: Module 13: Methodologies and Guidelines - Part 1 00:36 14: Module 14: Methodologies and Guidelines - Part 2 00:28 15: Module 15: Methodologies and Guidelines - Part 3 37:27 16: Module 16: Policies and Procedures - Part 1 00:37 17: Module 17: Policies and Procedures - Part 2 00:23 18: Module 18: Policies and Procedures - Part 3 35:05 19: Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 00:19 20: Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 00:30 21: Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 23:50 22: Module 22: Penetration Testing Results - Part 1 00:44 23: Module 23: Penetration Testing Results - Part 2 00:33 24: Module 24: Penetration Testing Results - Part 3 31:54 25: CPD Certificate - Free 01:00 Who is this course for? This Security Analyst Training course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Security Analyst Training. Moreover, this course is ideal for: Aspiring security analysts seeking foundational knowledge. IT professionals transitioning to security roles. Managers responsible for cybersecurity. Students pursuing cybersecurity degrees. Security enthusiasts aiming to enhance their skills. Requirements There are no requirements needed to enrol into this Security Analyst Training course. We welcome individuals from all backgrounds and levels of experience to enrol into this Security Analyst Training course. Career path After finishing this Security Analyst Training course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Security Analyst Training are: Security Analyst Penetration Tester Risk Assessor Vulnerability Auditor Cybersecurity Consultant Information Security Officer Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Security Analyst Training
Delivered Online On Demand5 minutes
£12