The goal of this course is to teach you the fundamentals of Alteryx and teach you a more efficient way to clean and prepare your data. You'll learn to work with data in new ways other than Tableau and PowerBI, using Alteryx for all your data analysis needs.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for Administrators who need to setup, configure and manage SharePoint Online as part of their Office 365 Administration. Overview After completing this course, students will gain the skills to: - Understand the architecture of SharePoint Online - Have knowledge of all the components in SharePoint Online - Have on hands on experience configuring the components of SharePoint Online - Have hands on experience configuring the options - Work with Site Collections and storage options - Manage user profiles and social profiling - Understand and configure data connectivity in SharePoint Online - Build a taxonomy structure - Understand and configure Search in SharePoint Online - Configure and deploy apps - Understand and define Enterprise content management and data loss prevention. - Configure additional options and features in SharePoint Online such as Information Rights Management This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online. 1 - INTRODUCTION TO OFFICE 365 AND SHAREPOINT ONLINE Introduction to the Office 365 Administration Center Configure Reporting Accessing SharePoint management tools Accessing security and compliancy Managing Office 365 and SharePoint Online with PowerShell Comparing On Premises SharePoint with SharePoint Online User identity in Office 365 and SharePoint Online Manging user domains Building Hybrid scenarios OneDrive and Sites redirection Yammer redirection Understand hybrid search Hybrid business data connectivity Hybrid taxonomy 2 - WORKING WITH SITE COLLECTIONS Introduction to classic and modern admin centers Creating Site Collections Defining ownership and security for site collections Configuring Storage Configure External Access to site collections Recovering site collections Configure external sharing Managing site collections with PowerShell 3 - MANAGING USER PROFILES Overview of the profile service Defining profile properties Map profile properties to a term store Creating custom profile properties Managing audiences Creating audiences Managing user profile policies Configure trusted my site host locations Configure preferred search center locations Defining read access permission levels Configuring newsfeed options Setup email notifications Configure my site cleanup 4 - WORKING WITH DATA CONNECTIONS Introduction to Data Connections Overview of PowerApps, Flow and PowerBi Overview of the business connectivity service Introduction to BDC definition files Creating BDC definition files Introduction to the secure store service Configuring the secure store service Creating secure store target application settings Configure connections to cloud services Configure connections to on-premises services Tools to build data connections Creating external content types Building external lists using external data 5 - MANAGING THE TERM STORE Overview of the term store Understanding terms and life cycle management Creating term groups Creating the term store Creating Term Sets in the UI Creating Term Sets via importing via a CSV Creating terms in the UI Creating terms via PowerShell and CSOM Manage terms with synonyms and pinning Configure delegated administration 6 - CONFIGURING SEARCH An Introduction to the search service Classic versus Modern search experience Understanding Managed Properties Create Managed Properties Manage Authoritative pages Understand Result sources Create and configure result sources Understand Query rules Promoting results through query rules Remove search results from the index Exporting search configurations Importing search configurations 7 - CONFIGURING APPS An Introduction to Apps Understanding the App Catalog Building the App catalog Adding Apps to the catalog Add Apps to your SharePoint sites Adding Apps via the marketplace store Manage App licensing Configure store access settings Monitoring app usage 8 - ENTERPRISE CONTENT MANAGEMENT IN SHAREPOINT ONLINE An Introduction to ECM in SharePoint Online Components of ECM Office 365 versus classic compliancy Understanding In-Place records management Configure In-Place records management Understanding the records center Build and configure a records center Understanding the compliancy policy center Build a compliancy policy center and configure policies Discover the security and compliancy center Configure an eDiscovery center Build an eDiscovery case Understand data loss prevention Build a data loss prevention policy and query Working with classification and data governance 9 - MANAGE OPTIONS FOR SHAREPOINT ONLINE Configure OneDrive features Configure use of Yammer or Newsfeeds Understand Information Rights Management Configure Information Rights Management Define site classification options Understand early release options for Office 365 Configure Early release options for your Office 365 tenant Manage Access Control Additional course details: Nexus Humans 55238 SharePoint Online for Administrators training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55238 SharePoint Online for Administrators course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Description VMware Virtual Infrastructure and vSphere is the most comprehensive curriculum in the IT world. This VMware vSphere 4.x/5.x to 5.5 Upgrade & New Tech Ult. Bootcamp Training covers everything you need to know about the VMware vSphere 4.x/5.x to vSphere 5.5 Upgrade and New Technology Ultimate Bootcamp. You will learn about vSphere 5.1 & 5.5, upgrading or migrating to vSphere 5.5, vsphere 5.x overview, virtual machine enhancements, managing vSphere 5.x administration, networking, storage, availability & scalability, and security enhancements, and more. This Program is designed by several chapters. In this VMware vSphere 4.x/5.x to 5.5 Upgrade & New Tech Ult. Bootcamp Training you will be introduce you with some introductory topics and the course methodology, you will also have a certification exam, you will get the physical setup, VMTraining Setup for the students, VMTraining's Network IP setup, Lab Term Use, Lab Convention Used. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our VMware vSphere 4.x/5.x to 5.5 Upgrade & New Tech Ult. Bootcamp Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Series Introduction and Methodology Series Introduction and Methodology FREE 00:05:00 Overview of vSphere 5.1 & 5.5 New Technology Overview 00:17:00 Licensing 00:07:00 vSphere 5 Requirements 00:29:00 Upgrade or Migrate to vSphere 5.5 Upgrades and Migrations 00:26:00 Virtual Machine Enhancements VM Details 00:47:00 Templates & Clones 00:06:00 VMware Converter 5.5 00:12:00 Managing vSphere 5.x Administration Host Profiles 00:03:00 Host Deployment Options 00:03:00 ESXi 5.5 Management 00:21:00 vCenter Server Appliance (vCSA) 00:02:00 vSphere Web Client 00:08:00 New Update Manager Features 00:18:00 vCenter Server 5.x Management 00:05:00 Networking Virtual Networks 00:08:00 vSphere Distributed Virtual Switches 00:28:00 Creating & Modifying Virtual Networks using CLI 00:06:00 Storage Storage Concepts 00:13:00 iSCSI Storage (GUI & Command Line) 00:04:00 Fibre Channel Storage 00:03:00 VMFS Datastores 00:06:00 NAS Storage and NFS Datastores 00:02:00 Profile-Driven Storage, Data store Clusters & Storage DRS (SDRS) 00:09:00 Solid State Disks (SSD) 00:02:00 vSphere Storage Appliance (VSA) 00:02:00 vSphere Flash Read Cache (vFRC) 00:03:00 VMware Virtual SAN (VSAN) 00:03:00 Availability vSphere Data Protection 5.5.5 (vDP) 00:11:00 vSphere Replication 5.5 00:06:00 Site Recovery Manager 5.5 (SRM) 00:08:00 High Availability (HA) 00:19:00 Security Enhancements Managing Firewalls 00:05:00 ESXi Active Directory (AD) Integration 00:03:00 vShield Family 00:04:00 Mock Exam Mock Exam- VMware vSphere 4.x/5.x to 5.5 Upgrade & New Tech Ult. Bootcamp Training 00:20:00 Final Exam Final Exam- VMware vSphere 4.x/5.x to 5.5 Upgrade & New Tech Ult. Bootcamp Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours Participants in this course will learn how to update, upgrade, and reinstall the macOS then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage FileVault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues Additional course details: Nexus Humans macOS Support Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the macOS Support Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
***Don't Spend More; Spend Smart*** Life Just Got Better This Summer! Get Hard Copy + PDF Certificates + Transcript + Student ID Card + e-Learning App as a Gift - Enrol Now Tired of browsing and searching for the course you are looking for? Can't find the complete package that fulfils all your needs? Then don't worry as you have just found the solution. Take a minute and look through this 13-in-1 extensive bundle that has everything you need to succeed in Work from Home Essentials and other relevant fields! After surveying thousands of learners just like you and considering their valuable feedback, this all-in-one Work from Home Essentials bundle has been designed by industry experts. We prioritised what learners were looking for in a complete package and developed this in-demand Work from Home Essentials course that will enhance your skills and prepare you for the competitive job market. Also, our Work from Home Essentials experts are available for answering your queries and help you along your learning journey. Advanced audio-visual learning modules of these courses are broken down into little chunks so that you can learn at your own pace without being overwhelmed by too much material at once. Furthermore, to help you showcase your expertise in Work from Home Essentials, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Work from Home Essentials Bundle Consists of the following Premium courses: Course 01: Working from Home Essentials Course 02: Online Course - A Perfect Guide to Home Business Course 03: Online Meeting Management Course 04: Using Zoom Meeting Effectively Course 05: ZOOM: Master Video Conferencing in Just 40 minutes! Course 06: Business Writing Course 07: Document Control Course 08: Level 2 Microsoft Office Essentials Course 09: Touch Typing Essentials Course 10: Effective Communication Skills Diploma Course 11: Stress Management Training Course 12: Functional Skills IT Course 13: Time Management Course 14: Freelancing on UpWork Benefits you'll get choosing Apex Learning: Pay once and get lifetime access to 13 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (For The Title Course) Hard Copy Certificate: Free (For The Title Course) Curriculum: Course 01: Working from Home Essentials Module 1: Introduction to Work from Home Module 2: Online Meeting Tools Module 3: Project Management Tools Module 4: Project Planning Tools Module 5: Communication Tools Course 02: Online Course - A Perfect Guide to Home Business Module 01: Introduction to Business Module 02: Understanding Entrepreneurship Module 03: What Is a Home-Based Business? Module 04: Introduction to Online Business Module 05: Introduction to Digital Marketing Module 06: E-Commerce Business Model: Dropshipping Module 07: E-Commerce Business Model: Affiliate Marketing Module 08: Opportunities for Home-Based Income Module 09: At-Home Professional Service Provider Business Module 10: Introduction to Freelancing Course 03: Online Meeting Management Module 01: Planning and Preparation Module 02: Online Meeting Platforms Module 03: Meeting Etiquette and Tips Course 04: Using Zoom Meeting Effectively Module 01: Introduction Module 02: What is Zoom Meeting? Module 03: Why Use Zoom? Module 04: Tighter Security Module 05: Create Zoom Account Module 06: Navigating Zoom as a Participant Module 07: Scheduling a Meeting Module 08: Navigating Zoom as the Host Module 09: Live on Zoom as a Participant Module 10: Live on Zoom as a Host Module 11: Zoom Webinar Introduction Module 12: Closing Remarks Course 05: ZOOM: Master Video Conferencing in Just 40 minutes! Intro Zoom Intro and signing up Hosting Your First Zoom Meeting Inviting Participants Manage Participants Sharing Screens and Whiteboards More Screen Share Options Chat, Recording and Reactions TIPS 01- Virtual Backgrounds TIPS 02 - Custom Virtual Background TIPS 03 - Video Settings TIPS 04 - Calendar Zoom Extension TIPS 05 - Hiding Floating Menu TIPS 06 - Mute All Shortcut TIPS 07 - New Share TIPS 08 - Pause Share TIPS 09 - Annotate Course 06: Business Writing Words to Cut Building Strong Sentences SCQA How to Write Punchy Summaries Words that Work, Feedback that Improves Proof Reading Makes Perfect Course 07: Document Control Module 1: Introduction to Document Control Module 2: Principles of Document Control and Elements of Document Control Environment Module 3: Document Control Lifecycle Module 4: Document Control Strategies and Instruments Module 5: Document Management Module 6: Quality Assurance and Controlling Quality of Documents Module 7: Project Document Control Module 8: Electronic Document Management Systems and Soft Copy Documentation Course 08: Level 2 Microsoft Office Essentials Excel 2016 Getting Started with Microsoft Office Excel 2016 Performing Calculations Modifying a Worksheet Formatting a Worksheet Printing Workbooks Managing Workbooks Word 2016 Getting Started with Word Formatting Text and Paragraphs Working More Efficiently Managing Lists Adding Tables Inserting Graphic Objects Controlling Page Appearance Preparing to Publish a Document Workbooks - Microsoft Word 2016 (Beginner) PowerPoint 2016 PowerPoint Interface Presentation Basics Formatting Inserting Options Working with Objects Table Charts Review and Presentatin Access 2016 Introduction to Access Modify Data Working with Queries Access Forms Working with Reports Course 09: Touch Typing Essentials Course 10: Effective Communication Skills Diploma Course 11: Stress Management Training Course 12: Functional Skills IT Course 13: Time Management Course 14: Freelancing on UpWork CPD 145 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Work from Home Essentials bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Work from Home Essentials is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so that you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included
Duration 2 Days 12 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Sales engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service profiles Describe and configure Cisco UCS service profile templates Describe and implement iSCSI on Cisco UCS Describe and implement Cisco UCS firmware updates Describe and implement Cisco UCS backups This introductory course shows you how to deploy, secure, operate and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade server, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex product family, for use in data centers. Describing Cisco UCS Server Hardware Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Cisco UCS S-Series Rack Servers Cisco Virtual Interface Cards Hyperconvergence Overview Cisco HyperFlex HX-Series Servers Describing Cisco UCS Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Cisco UCS C-Series Connectivity Cisco UCS S-Series Connectivity Cisco HyperFlex Connectivity Architecture Cisco HyperFlex Edge Connectivity Ethernet End-Host Mode Compared to Switching Mode Cisco UCS Fabric Interconnect Uplink Pinning Cisco UCS C-Series Integration Describing the Cisco HyperFlex HX Data Platform Cisco HyperFlex HX Data Platform Software Writing Data to Cisco HyperFlex HX Data Platform Reading Data from Cisco HyperFlex HX Data Platform Data Optimization in Cisco HyperFlex HX Data Platform Configuring Cisco UCS Service Profiles Portability Issue with Nonabstracted Identities Cisco UCS Service Profile Identity Pools Server Pools IP Pools Configuring Cisco UCS Service Profile Templates Service Profile Templates Implementing iSCSI on Cisco UCS iSCSI Addressing Evolution of SCSI from DAS to SAN iSCSI Multipathing Implementing Cisco UCS Firmware Updates Update Cisco UCS C-Series Server Firmware Download Tasks for the Infrastructure Image Download Tasks for Cisco UCS B-Series Firmware Packages Best Practices for Updating Firmware in Cisco UCS Manager Firmware Upgrades Using Auto Install Capability Catalog Updates Host Firmware Packages Driver Updates for Operating Systems and Hypervisors Implementing Cisco UCS Backups Compare Backup Options in Cisco UCS Manager Compare Two Import Types Policy Backup
The course is intended to help people learn Azure concepts quickly and give enough practice exercises to get them started with their cloud journey with a specific focus on Microsoft Azure.
Course Overview Whether you want to become a web developer or a web host having an adequate understanding of cPanel is a must. The cPanel Complete Guideline installation and configuration is here to assist you in acquiring the skills and ability to use cPanel to manage a wide number of websites, email accounts and other essential aspects of web hosting. The cPanel Complete Guideline Installation and Configuration course is packed with theoretical and practical information on cPanel. In this course, you will get introduced to the cPanel configurations and learn how to install cPanel on the server. From the easy to follow module, you will pick up the skills and expertise to install PHP extensions, Nginx and Firewall. Here, you will receive a detailed lecture on SSH security configurations. This course will help you comprehend the process of automatic backup. Within a few steps, you will earn enough expertise for WordPress installation. The cPanel Complete Guideline installation and configuration course is a complete package built to equip you with practical cPanel skills. Join the course today and increase your employability in the relevant industry. Learning Outcomes Familiarize yourself with the steps of installing cPanel on the server Build an understanding of basic cPanel configurations Learn how to install PHP extensions Enrich your knowledge of SSH security configurations Understand the process of installing WordPress on cPanel Who is this course for? The cPanel Complete Guideline Installation and Configuration course is for individuals who want to learn about cPanel software Entry Requirement Basic Linux Knowledge Basic understanding of web development and web hosting This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The cPanel Complete Guideline Installation and Configuration course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Web designers Web developers Web Host Module 01: Introduction Introduction 00:10:00 Module 02: Setup Server and Connect to SSH Setup Server and Connect to SSH 00:12:00 Module 03: Installing cPanel on the Server Installing cPanel on the Server 00:09:00 Module 04: Explain Domain Records and Hostname Explain Domain Records and Hostname 00:06:00 Module 05: Basic cPanel Configuration Basic cPanel Configuration 00:19:00 Module 06: Notices About Auto Hostname ssl Notices About Auto Hostname ssl 00:03:00 Module 07: SSH Security Config SSH Security Config 00:09:00 Module 08: Encrypt ssl Plugin Encrypt ssl Plugin 00:05:00 Module 09: PHP Security and Configuration PHP Security and Configuration 00:08:00 Module 10: Installing PHP Extensions Installing PHP Extensions 00:16:00 Module 11: Apache Web server Configuration Apache Web server Configuration 00:21:00 Module 12: Installing Nginx as a Reverse Proxy Installing Nginx as a Reverse Proxy 00:08:00 Module 13: Firewall Installation and Configuration Firewall Installation and Configuration 00:27:00 Module 14: Automatic Backup and Restore Automatic Backup and Restore 00:27:00 Module 15: Installing Wordpress on cPanel to Test Database Installing WordPress on cPanel to Test Database 00:13:00 Module 16: Upgrade to Cloudlinux Upgrade to Cloudlinux 00:17:00 Module 17: Cloudlinux and LVE Configuration Cloudlinux and LVE Configuration 00:06:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Master the art of self-hosting WordPress on Linux with our comprehensive video course, designed to empower technical professionals to fully control their web presence.