• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

272 Courses delivered Online

Social Anxiety Therapy

By IOMH - Institute of Mental Health

Do crippling anxieties prevent you from enjoying social situations? Does the fear of judgment keep you from connecting with others? Social anxiety can be isolating, but there is hope. This Social Anxiety Therapy course offers a roadmap to overcoming social anxiety and reclaiming your social life. Social Anxiety Therapy offers a transformative path to freedom from the debilitating grip of social anxiety. In the UK, approximately 1 in 8 individuals suffer from this condition, impacting their personal and professional lives. This comprehensive Social Anxiety Therapy course unlocks a powerful toolkit, equipping you with mindfulness techniques, cognitive strategies, and a profound understanding of the self. Embark on a transformative journey, where you'll learn to embrace acceptance, challenge limiting thoughts, and cultivate a newfound resilience in social situations. Unlock your true potential and reclaim the joy of genuine connections. Social Anxiety Therapy empowers you to transcend fear, embrace vulnerability, and live life to its fullest. This Social Anxiety Therapy course covers the following topics: Identify core social anxiety concepts like Acceptance and Commitment Therapy (ACT). Recognise and challenge unhelpful safety behaviours that maintain anxiety. Develop mindfulness skills to manage difficult emotions and body sensations. Identify and challenge unhelpful thought patterns that fuel anxiety. Explore techniques to create psychological distance from negative thoughts. Understand how to build a more fulfilling and values-driven life. Details Perks of Learning with IOMH One-to-one support from a dedicated tutor throughout your course. Study online - whenever and wherever you want. Instant Digital/ PDF certificate 100% money back guarantee 12 months access Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement After completing the Social Anxiety Therapy course, you will receive your CPD-accredited Digital/PDF Certificate for £5.99. To get the hardcopy certificate for £12.99, you must also pay the shipping charge of just £3.99 (UK) and £10.99 (International). Who Is This Course for? This Social Anxiety Therapy is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the Social Anxiety Therapy course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Social Anxiety Therapy Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Section 01 Introduction 00:03:00 What is ACT 00:06:00 Defining Social Anxiety 00:03:00 Diagnosis of Social Anxiety 00:04:00 Situations That Trigger Social Anxiety 00:01:00 Section 02 Four Component of Safety Behavior 00:02:00 Types of Safety Behaviors 00:05:00 Knowing What Really Matters 00:10:00 Section 03 Mindfulness 00:03:00 Anapana Meditation 00:05:00 Acceptance of Bodily Sensations 00:04:00 Vipassana Meditation 00:08:00 Being with Anxiety 00:03:00 Section 04 Introduction 00:01:00 Types of Anxiety Thought 00:07:00 The Thought That 00:02:00 Labelling Effect 00:01:00 Ditching the Meaning 00:02:00 Waterfall Metaphor 00:01:00 Bringing It All Together 00:02:00 Wrap up 00:01:00 Section 05 Bonus Cognitive Defusion 00:11:00 Self as Context 00:14:00

Social Anxiety Therapy
Delivered Online On Demand1 hour 39 minutes
£11

BlackArch Linux: Ethical Hacking and Penetration Testing

4.8(9)

By Skill Up

Dive into the world of Ethical Hacking and Penetration Testing with BlackArch Linux. Master cybersecurity, vulnerability assessment, and network security.

BlackArch Linux: Ethical Hacking and Penetration Testing
Delivered Online On Demand7 hours 8 minutes
£25

Online Options

Show all 272

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2475

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online + more
£3395

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered Online + more
£595

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2475

BRCGS Vulnerability Assessment for Food Fraud (1 Day)

5.0(1)

By Ask Sonia Limited

Official BRCGS Product Safety Management course: Vulnerability Assessment for Food Fraud. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Vulnerability Assessment for Food Fraud (1 Day)
Delivered Online + more
£325

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3495

Wellness Lab: Embracing vulnerability

5.0(2)

By The Self Leadership Initiative

Learn to use vulnerability to live an authentic and courageous life.

Wellness Lab: Embracing vulnerability
Delivered OnlineFlexible Dates
£10

Vulnerability, Abuse & Safeguarding

4.5(3)

By Studyhub UK

In today's interconnected world, understanding the complex facets of vulnerability and abuse is paramount. Introducing 'Vulnerability, Abuse & Safeguarding', a comprehensive course designed to equip participants with the tools and knowledge to identify, respond, and prevent abuse in a myriad of settings. From diving deep into adult safeguarding systems to comprehending the nuances of whistleblowing, this curriculum ensures a holistic view on the subject, while paying special attention to the principles of safeguarding children, young people, and vulnerable adults. Learning Outcomes Understand the established systems and procedures related to adult safeguarding. Develop skills to effectively respond to suspected or disclosed instances of abuse or neglect. Recognise the importance and procedures of whistleblowing and information dissemination. Gain insights into protective measures for children, young individuals, and the broader spectrum of vulnerable adults. Delve into the intricacies of restrictive practices and the significance of online safety measures. Why buy this Vulnerability, Abuse & Safeguarding course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Vulnerability, Abuse & Safeguarding there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Vulnerability, Abuse & Safeguarding course for? Social workers aiming to expand their safeguarding expertise. Parents or guardians keen to enhance their protective abilities. Teachers and educational professionals striving for a safer classroom environment. Healthcare professionals dedicated to the well-being of their patients. Online moderators and community managers focusing on digital safety. Prerequisites This Vulnerability, Abuse & Safeguarding does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Vulnerability, Abuse & Safeguarding was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Safeguarding Officer: £25,000 - £35,000 Child Welfare Specialist: £28,000 - £40,000 Social Services Manager: £30,000 - £50,000 Health and Safety Officer: £22,000 - £32,000 Safeguarding Consultant: £35,000 - £50,000 Online Safety Advisor: £27,000 - £38,000 Course Curriculum Module 01: Systems & Procedures Relating to Adult Safeguarding Systems & Procedures Relating to Adult Safeguarding 00:13:00 Module 02: Response to Suspected or Disclosed Abuse or Neglect Response to Suspected or Disclosed Abuse or Neglect 00:14:00 Module 03: Whistleblowing and Information Sharing Whistleblowing and Information Sharing 00:14:00 Module 04: Safeguarding a Child or Young Person Safeguarding a Child or Young Person 00:14:00 Module 05: Principles to Safeguard Vulnerable Adults Principles to Safeguard Vulnerable Adults 00:14:00 Module 06: Restrictive Practices, Restraint, Deprivation of Liberty Restrictive Practices, Restraint, Deprivation of Liberty 00:14:00 Module 07: Abuses and Individual Vulnerability and Online Safety Measures Abuses and Individual Vulnerability and Online Safety Measures 00:16:00

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand1 hour 39 minutes
£10.99

Vulnerability, Abuse & Safeguarding

By IOMH - Institute of Mental Health

Overview of Vulnerability, Abuse & Safeguarding Join our Vulnerability, Abuse & Safeguarding course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Vulnerability, Abuse & Safeguarding course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Vulnerability, Abuse & Safeguarding course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This Vulnerability, Abuse & Safeguarding Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Vulnerability, Abuse & Safeguarding. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Vulnerability, Abuse & Safeguarding course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Vulnerability, Abuse & Safeguarding is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Vulnerability, Abuse & Safeguarding course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Vulnerability, Abuse & Safeguarding Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Systems & Procedures Relating to Adult Safeguarding Systems & Procedures Relating to Adult Safeguarding 00:13:00 Module 02: Response to Suspected or Disclosed Abuse or Neglect Response to Suspected or Disclosed Abuse or Neglect 00:14:00 Module 03: Whistleblowing and Information Sharing Whistleblowing and Information Sharing 00:14:00 Module 04: Safeguarding a Child or Young Person Safeguarding a Child or Young Person 00:14:00 Module 05: Principles to Safeguard Vulnerable Adults Principles to Safeguard Vulnerable Adults 00:14:00 Module 06: Restrictive Practices, Restraint, Deprivation of Liberty Restrictive Practices, Restraint, Deprivation of Liberty 00:14:00 Module 07: Abuses and Individual Vulnerability and Online Safety Measures Abuses and Individual Vulnerability and Online Safety Measures 00:16:00

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand1 hour 39 minutes
£11

Vulnerability, Abuse & Safeguarding

4.8(9)

By Skill Up

Master the essentials of Vulnerability, Abuse & Safeguarding. Learn to protect at-risk individuals with practical skills for adult and child safeguarding, whistleblowing, and online safety.

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand2 hours
£10.99

Educators matching "vulnerability"

Show all 28
The Vulnerability Registration Service

the vulnerability registration service

Coventry

The Vulnerability Registration Service (VRS) gives vulnerable people a single place to register their status, helping them avoid repeating the same difficult conversations every time they engage with organisations like lenders and creditors. It is a “Not for Profit Company Limited by Guarantee” whose aim is to help vulnerable consumers protect themselves against the financial, social and very personal hardship suffered as a result of debt and financial problems. The stakeholders in the VRS all have experience working in Consumer Credit markets. There are regulatory, compliance, consumer affairs and IT expertise and acknowledged experts on our management team and Board. The VRS has a separate and independent Advisory Board of experts that meets regularly and feeds into the VRS appropriate advice and innovation to help drive the VRS forward. There has been considerable interest shown in the initiative since its launch from consumers and businesses alike. The VRS continues to grow as awareness expands among creditors and service providers of all sectors. Debt advice and mental health organisations are also supportive of the work the VRS does, and using the register to load consenting vulnerable consumers who wish to refer or auto decline lending and credit applications. The VRS provides businesses with instant API decisions and access to upload your consenting vulnerable consumers onto the VRS register. They are also able to upload consenting consumers on the VRS register via Secure File Transfer Protocol (SFTP) and retrieve data from the SFTP.

The Self Leadership Initiative

the self leadership initiative

5.0(2)

Creating confident, resilient and emotionally intelligent leaders. The SLI is all about providing immersive and engaging training within the higher education sector so that... * You can feel proud knowing that you are sending empowered young leaders out into the world to do great things  * Your students can be top level performers in their studies and the job market * You can get on with what you do best, knowing that your student's development is taken care of The higher education sector is fast paced and facing ever increasing pressures: Get students ready for employment, provide a rich university experience, score high on the national student survey, get great academic results, support students’ mental health and much more! It’s no wonder that young people come out of the other end feeling that they are missing out on key skills they need to succeed.  The pillars of student success The Self Leadership Initiative focuses on core skills that your students need to become academically successful, find meaningful work and look after their whole selves in the process: ✔️ Leadership – Supporting students to find their unique style of helping teams work towards a shared vision. ✔️ Teamworking – Equipping students to use their strengths effectively to achieve group goals. ✔️ Conflict Resolution – Preparing students to effectively handle difficult conversations and find the win-win. ✔️ Organisational Skills – Teaching students to manage their time and motivation effectively to complete tasks and projects. ✔️ Public Speaking & Communication – Helping students assertively and confidently get their message across. ✔️ Wellbeing – Strengthening students self esteem, resilience and coping strategies for positive mental health. Training tailored to you You can find a range of publicly bookable workshops here on Cademy. However, what makes The SLI your specialist partner is the ability to design bespoke online and in-person training programmes to suit your student's and staff's needs. Visit the website to book in a free training consultation and have a chat about what you need.