• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25252 Courses delivered Online

Effective Communication Skills

By Compete High

Overview: Effective Communication Skills In today's interconnected world, effective communication is an invaluable asset. Whether you're interacting in your personal relationships, navigating professional environments, or engaging with broader communities, the ability to convey ideas, thoughts, and emotions with clarity and precision is essential. The 'Effective Communication Skills' course is designed to equip learners with the knowledge, strategies, and practical techniques necessary to become adept communicators across various mediums.   Chapter 1: Effective Communication The foundation of effective communication lies in understanding its fundamental principles. In this introductory chapter, learners will delve into the core concepts that underpin successful communication. From the basic elements of encoding and decoding messages to the importance of active listening and feedback, participants will gain insights into the dynamics of human interaction. Key topics covered in this module include: The communication process: Explore the stages involved in transmitting and receiving messages, including encoding, transmitting, receiving, decoding, and feedback. Verbal and nonverbal communication: Understand the role of both verbal language and nonverbal cues such as body language, facial expressions, and gestures in conveying meaning. Barriers to communication: Identify common obstacles that hinder effective communication, such as noise, cultural differences, language barriers, and emotional barriers. Active listening: Learn techniques to enhance listening skills, including paraphrasing, clarifying, summarizing, and empathizing with the speaker. Through a combination of theoretical concepts, real-world examples, and interactive exercises, learners will develop a solid understanding of the principles of effective communication and how they can be applied in various contexts. Chapter 2: Effective Verbal Communication Verbal communication plays a central role in interpersonal interactions, presentations, negotiations, and everyday conversations. In this module, participants will explore strategies for mastering the art of verbal communication and fostering meaningful connections with others through spoken language. Key components of this chapter include: Clarity and conciseness: Discover techniques for articulating thoughts and ideas clearly and succinctly to ensure that messages are easily understood by others. Tone and delivery: Explore the impact of tone of voice, pacing, pitch, and emphasis on the interpretation of verbal messages, and learn how to adapt these elements to different situations and audiences. Assertiveness and confidence: Develop strategies for expressing opinions, making requests, and asserting boundaries with confidence and assertiveness, while also respecting the perspectives of others. Effective questioning and feedback: Master the art of asking open-ended questions, providing constructive feedback, and engaging in productive dialogue to foster mutual understanding and collaboration. Through practical exercises, role-playing scenarios, and guided feedback sessions, learners will hone their verbal communication skills and gain confidence in their ability to express themselves effectively in various contexts. Chapter 3: Effective Written Communication In an age dominated by digital communication channels, the ability to communicate effectively in writing is more important than ever. This module focuses on developing proficiency in written communication, from crafting clear and concise emails to drafting persuasive reports and documents. Key themes covered in this module include: Structure and organization: Learn how to structure written communication effectively, including the use of introductions, main body paragraphs, and conclusions to guide the reader through the content. Clarity and precision: Explore techniques for writing clearly and concisely, avoiding jargon, ambiguity, and unnecessary complexity to ensure that messages are easily understood by the intended audience. Tone and style: Understand the importance of tailoring the tone and style of writing to suit the purpose, audience, and context, whether it's formal, informal, persuasive, or informative. Editing and proofreading: Develop strategies for reviewing and revising written work to correct errors in grammar, punctuation, spelling, and style, ensuring that the final product is polished and professional. By practicing writing exercises, analyzing sample texts, and receiving constructive feedback, participants will enhance their written communication skills and become more effective communicators in both personal and professional settings.   Conclusion The 'Effective Communication Skills' course provides a comprehensive framework for mastering the art of communication in today's fast-paced world. By exploring the principles of effective communication, mastering verbal and written communication techniques, and practicing through interactive exercises, participants will develop the skills and confidence needed to succeed in any communication context. Whether you're a seasoned professional looking to enhance your communication skills or an aspiring communicator seeking to build a strong foundation, this course offers valuable insights and practical strategies for achieving your goals. Course Curriculum Chapter 1 Effective Communication Effective Communication 00:00 Chapter 2 Effective Verbal Communication Effective Verbal Communication 00:00 Chapter 3 Effective Written Communication Effective Written Communication 00:00

Effective Communication Skills
Delivered Online On Demand3 hours
£25

S4H01 SAP Business Suite to SAP S/4HANA Delta

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for SAP professionals Overview Explain the motivation and need for a next generation business suite and how SAP S/4HANA enables a digital organizationDescribe the SAP S/4HANA business and technical architectureGain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoptionExplain how SAP S/4HANA supports the business users with a new user experience (e.g.: SAP Fiori UX)Describe key business processes of SAP S/4HANA Enterprise ManagementExplain SAP S/4HANA embedded analytics capabilitiesGain basic knowledge about SAP S/4HANA LoB solutions and add-on supportDescribe integration scenarios between SAP S/4HANA and SAP Cloud solutions In this course, students learn a broad range of topics including the motivation behind the development of SAP S/4HANA. Course Outline Introduction to SAP S/4HANA SAP S/4HANA user experience SAP HANA powers SAP S/4HANA SAP Activate for SAP S/4HANA SAP S/4HANA Enterprise Management, LoB solutions and add-ons SAP S/4HANA embedded analytics Integration between SAP S/4HANA Core and SAP Cloud solutions Additional course details: Nexus Humans S4H01 SAP Business Suite to SAP S/4HANA Delta training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H01 SAP Business Suite to SAP S/4HANA Delta course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4H01 SAP Business Suite to SAP S/4HANA Delta
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat JBoss AMQ Administration (AD440)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for application administrators, developers, IT leaders, and application architects. Overview As a result of attending this course, students should be able to configure, secure, and manage a Red Hat JBoss AMQ 7.0 broker to create and integrate message-driven applications. Red Hat© AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer the message broker, Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. This course is based on Red Hat JBoss AMQ 7.0. Red Hat JBoss AMQ, part of the Red Hat application integration suite, provides application administrators, software architects, and developers the ability to integrate disparate applications in a decoupled manner using enterprise messaging paradigms. Providing a highly performant and robust message broker, router, and client libraries for numerous languages, Red Hat JBoss AMQ is the solution for asynchronous and synchronous messaging. Red Hat AMQ Administration (AD440) helps system administrators, architects, and developers acquire the skills they need to administer Red Hat JBoss AMQ. Through numerous hands-on exercises, the student will create, configure, manage, and monitor broker instances including hardened, clustered brokers that provide high availability and failover. Course introduction Introduce and review the course. Install the broker Install JBoss AMQ, create a broker instance, and verify connectivity to the instance. Configuration Configure message addresses and queues. Secure access to the broker Configure authentication, authorization, and encryption on the broker. Configure broker persistence Configure zero, file-based, and database-backed persistence. Manage broker resource consumption Configure the broker to limit memory and other resource consumption. Implement broker clustering, high availability, and failover Create a scalable and highly available cluster of brokers. Monitor and manage the broker Monitor and manage broker resources using logging and the web console. Route messages to brokers Install JBoss AMQ interconnect and configure routes to brokers. Comprehensive review of Red Hat AMQ administration Configure Red Hat JBoss AMQ brokers and verify proper operation.

Red Hat JBoss AMQ Administration (AD440)
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Databases | Database Security (TT8700)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real

Securing Databases | Database Security (TT8700)
Delivered OnlineFlexible Dates
Price on Enquiry

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MS devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MS Switches Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MS Switches. Students will also learn how to configure the Meraki Dashboard. Student will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki Switching MS Switch Platforms and Features MS Feature: Multi-gigabit Ethernet Cisco Meraki MS Access Switches Cisco Meraki MS Aggregation Switches Using Tags to search, monitor and configure Meraki Switches Meraki Switch Configuration Port Configuration Meraki Switch Monitoring Troubleshooting Tools Managing Firmware Upgrades

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances
Delivered OnlineFlexible Dates
Price on Enquiry

HA200 SAP HANA 2.0 SPS04 - Installation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Install and update an SAP HANA 2.0 SPS04 database Installation and configuration of SAP HANA cockpit 2.0 SP10 Perform the SAP HANA system administration tasks using SAP HANA cockpit 2.0 SP10 in a multitenant database environment Start and stop, change the configuration, backup and troubleshoot an SAP HANA 2.0 SPS04 database Backup and recover a multitenant SAP HANA 2.0 SPS04 database This course covers in detail all key capabilities of SAP HANA database system administration. Through the lectures and exercises you will learn how to install, update and operate an SAP HANA 2.0 SPS04 database using SAP HANA Cockpit 2.0 SP10. The course covers the most important database administration tasks of an SAP HANA system administrator. During the course, you will learn details about starting and stopping, changing the configuration parameters, monitoring the database, backup and recovery and troubleshoot of a multitenant SAP HANA 2.0 SPS04 database system. Course Outline This course is the best starting point to learn about SAP HANA installation, update, configuration and system administration The course is independent from the SAP NetWeaver administration world, as it teaches how to perform system administration on the SAP HANA platform. The system administration tools used are native to the SAP HANA platform At the end, you will be able to perform all the required daily system administration tasks on the SAP HANA database platform Throughout the course, you will learn about the following SAP HANA tools for installation, update, configuration and system administration SAP HANA database lifecycle manager (HDBLCM) SAP HANA cockpit 2.0 SP10 SAP HANA HDBSQL command line Contents SAP HANA introduction Installation sizing and OS preparations SAP HANA installation and upgrade of a multitenant database SAP HANA architecture and deployment options SAP HANA cockpit 2.0 installation and configuration SAP HANA Administration tools Post installation steps Database administration tasks using SAP HANA cockpit 2.0 Backup and recovery using SAP HANA cockpit 2.0 SAP HANA Security User and authorizations

HA200 SAP HANA 2.0 SPS04 - Installation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Overview of MySql Masterclass Join our MySql Masterclass course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The MySql Masterclass course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The MySql Masterclass course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! This MySql Masterclass Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this MySql Masterclass. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online — Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion – Digital / PDF Certificate After completing the MySql Masterclass course, you can order your CPD Accredited Digital/ PDF Certificate for £5.99. Certificate of Completion – Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This MySql Masterclass is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don’t have the time to devote to traditional education. Requirements You don’t need any educational qualification or experience to enrol in the MySql Masterclass course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this MySql Masterclass Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors.

MySql Masterclass
Delivered Online On Demand13 hours 22 minutes
£11.99

Organizational Behaviour, HR and Leadership

By IOMH - Institute of Mental Health

Overview of Organisational Behaviour, HR and Leadership Join our Organisational Behaviour, HR and Leadership course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Organisational Behaviour, HR and Leadership course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Organisational Behaviour, HR and Leadership course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! This Organisational Behaviour, HR and Leadership Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Organisational Behaviour, HR and Leadership. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online — Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion – Digital / PDF Certificate After completing the Organisational Behaviour, HR and Leadership course, you can order your CPD Accredited Digital/ PDF Certificate for £5.99. Certificate of Completion – Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Organisational Behaviour, HR and Leadership is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don’t have the time to devote to traditional education. Requirements You don’t need any educational qualification or experience to enrol in the Organisational Behaviour, HR and Leadership course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Organisational Behaviour, HR and Leadership Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors.

Organizational Behaviour, HR and Leadership
Delivered Online On Demand1 hour 7 minutes
£11.99

Power BI - dashboards (1 day) (In-House)

By The In House Training Company

Power BI is a powerful data visualisation program that allows businesses to monitor data, analyse trends, and make decisions. This course is designed to provide a solid understanding of the reporting side of Power BI, the dashboards, where administrators, and end users can interact with dynamic visuals that communicates information. This course focuses entirely on the creation and design of visualisations in dashboards, including a range of chart types, engaging maps, and different types of tables. Designing dashboards with KPI's (key performance indicators), heatmaps, flowcharts, sparklines, and compare multiple variables with trendlines. This one-day programme focuses entirely on creating dashboards, by using the many visualisation tools available in Power BI. You will learn to build dynamic, user-friendly interfaces in both Power BI Desktop and Power BI Service. 1 Introduction Power BI ecosystem Things to keep in mind Selecting dashboard colours Importing visuals into Power BI Data sources for your analysis Joining tables in Power BI 2 Working with data Utilising a report theme Table visuals Matrix visuals Drilling into hierarchies Applying static filters Group numbers with lists Group numbers with bins 3 Creating visuals Heatmaps in Power BI Visualising time-intelligence trends Ranking categorical totals Comparing proportions View trends with sparklines 4 Comparing variables Insert key performance indicators (KPI) Visualising trendlines as KPI Forecasting with trendlines Visualising flows with Sankey diagrams Creating a scatter plot 5 Mapping options Map visuals Using a filled map Mapping with latitude and longitude Mapping with ArcGIS or ESRI 6 Creating dashboards High-level dashboard Migration analysis dashboard Adding slicers for filtering Promote interaction with nudge prompts Searching the dashboard with a slicer Creating dynamic labels Highlighting key points on the dashboard Customised visualisation tooltips Syncing slicers across pages 7 Sharing dashboards Setting up and formatting phone views Exporting data Creating PDF files Uploading to the cloud Share dashboards in SharePoint online

Power BI - dashboards (1 day) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry