• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

28 Educators providing Courses delivered Online

Deafkidz International

deafkidz international

Brighton,

No Deaf child should be left behindOur Vision A world where Deaf, hard of hearing, deafened and DeafBlind children, young people and adults are able to live safely and without fear of abuse and exploitation. Our Mission With safeguarding at the heart of all we do, DeafKidz International aims to respond comprehensively to the protection, health, wellbeing and access to education needs of deaf children, young people and adults worldwide. Why our work is needed Deafness is the third largest disability globally with 466 million deaf people worldwide yet it remains the least resourced. The abuse and exploitation of deaf children is endemic, with deaf children three times more likely to be abused than hearing children, but safeguarding and protection networks lack the means to support deaf survivors/victims of abuse and deaf children at risk. Deaf children face barriers to accessing services and support from teachers, social workers, police workers, medical staff and the justice system, often due to the lack of deaf awareness and resources available to these professionals who are unable to effectively communicate with or support the needs of deaf children. In low-middle income countries often children are not even diagnosed as being deaf which exacerbates risk of abuse and prevents them from accessing vital support they need. DeafKidz International seeks to address the vital gaps in meeting the safeguarding and protection needs of deaf children and reducing risk and vulnerability while supporting deaf children, young people and adults to lead their fullest lives ensuring equal and rightful access to health, education and employment as their hearing peers.

Loren Snow

loren snow

London

Hi, I'm Loren Snow: an autism trainer based in Bristol. I’ve spent the past decade studying mental health, psychology, relationships, identity, and just about anything to do with why we humans think and act the way we do. I believe that we're all human, and make mistakes, fumble, fall, laugh, love - and despite our differences, we all share this same connection. I'm a strong believer in having the courage to be open and honest and that our truth and vulnerability can be powerful forces in showing us how connected we really are. In my early-twenties I was diagnosed with Autism, ADHD, and OCD. For me, these were revelations, and all the strange ways I behaved started to make sense. But why in my twenties... surely someone should have noticed or said something?!? As I came to learn more about autism I soon realised that my experience was all too common. The reality is there are many complicated things around autism, such as echolalia, alexithymia, and proprioception; there are many misconceptions in the media, such as autistic people lacking empathy; and there are many mis/un-diagnosed autistic adults out there like I used to be. This made me decide that I should explain these things so others wouldn't have to struggle as I did. I've spoken on podcasts, radio, to large and small crowds. My YouTube videos have been watched by tens of thousands! I've taught thousands of parents of autistic and ADHD children and teach regular courses to parents and autistic people. I see many businesses confused about how to help, parents lost on what to believe, and autistic people struggling to understand themselves. So what better place to learn about autism than directly from an autistic person like myself!

Edifylabs

edifylabs

London

^bout Us Our team of expert cyber security consultants leverage years of experience and intelligence from a number of sectors including: national security, public service operations, finance, telecommunications, and commercial cyber operations. Our advice is always tailored to your business needs and ambitions, providing a bespoke and balanced report that contrasts between security controls and enabling your business functions for your information technology systems. We are able to provide an assessment on how your organisation is currently protected against existing cyber attacks and we can translate technical analysis into clear and pragmatic advice and actions, to be used as the basis of a cyber security implementation plan. At Edifylabs we are committed to making cyber security easier to understand; We are experienced in consulting with big enterprises, small-medium-enterprises(SMEs) and even start-ups! Cyber security/maturity doesn’t have to be a dauting concept, and we’re here to support your team and increase your awareness and capabilities on cyber attacks and defences. Our mission is to provide:Trust, Independence, & Knowledge Sharing. Through our three main core services: Attack, Respond, & Protect Our three services sub-divide into the following activities: Attack Pentesting (or Penetration Testing) Red Teaming Respond Blue Teaming Incident Response Malware Prevention Protect Security Architecture Cyber Security Consultancy Data Privacy & GDPR Our solutions and services are not restricted to products from a single vendor or platform. Based on the client’s requirements, we decide which products are best suited to their needs and work accordingly. We have strategic partnerships and domain expertise with most of the well-known names in the cyber forensic and cybersecurity industry. We offer a complete portfolio of forensic and security services: Data Breach Disk Forensics Mobile Forensics Computer Forensics Vulnerability Assessment SIEM Services App Security Proactive IPS Endpoint Security

Triple A (All About Autism)

triple a (all about autism)

Penrith

Triple A is an autism charity working across all of Cumbria. It was set up as a charity in 2016 as a response to a perceived ‘360 degree’ vulnerability within the autism community in Cumbria, and to provide better support among autistic adults living in Cumbria. Triple A was founded by Helen Storey, who has a long and successful record of developing projects to support marginalised communities. Helen has first-hand experience in the field of autism, underpinned by accredited learning (University Of Cumbria). Helen went on to become our first CEO, overseeing our incorporation as a CIO (a Charitable Incorporated Organisation) in 2018 and leading the charity until 2021. Our journey since 2016 has involved two office moves (we’re now based right next to Penrith bus station, in a lovely pink building), the development of a range of services to support autistic people right across Cumbria, and a range of autism awareness training programs. We now have a small team of dedicated staff, and in 2022 we welcomed Nick Rosenthal to the team as our new CEO – just in time to help us roll out two major new projects: running an NHS-funded post-diagnostic course to support newly diagnosed autistic people and launching a scheme to help autistic adults across Cumbria into paid, long-term employment. In the background we have a team of committed Trustees, many of whom are neurodiverse. We don’t want to point out which of our trustees and staff are autistic, as many people consider that to be very personal information, but lived experience of autism lies at the very heart of Triple-A. The Triple A team has designed a pathway of support for autistic adults (shown below), which focuses on social support, criminal and social justice but also on health and well-being for autistic people in Cumbria. Our charity aims to facilitate positive and sustainable change for autistic people – to raise awareness of the issues & challenges that autistic people face, and to bring people together to create and develop solutions. We may have seen a few changes as we’ve grown since 2016, but our core values remain the same!

KCA Knowledge Change Action

kca knowledge change action

We provide the Knowledge base that can Change thinking and perspective so that our communities can take Action to transform the lives of others. 'Achieving breakthrough outcomes for children experiencing significant adversity requires that we support the adults who care for them to transform their own lives.' From report 'Best Practices to Breakthrough Impacts', Harvard 2016 KCA (previously known as Kate Cairns Associates) was established in 2011 to bring together the work of Kate Cairns and a group of experienced practitioners and trainers across the UK. We are now registered as Knowledge Change Action Ltd, and as of October 2021 we have become an Employee Owned Trust. As an employee-owned organisation KCA aspires to be a beacon to those who want to lead sustainable organisations, rooted in their local communities, where employees are active decision makers shaping their future together. Our small, experienced team, managed from our Head Office in Gloucestershire, has an excellent track record in running effective training programmes, rooted in the science-based theory of attachment, trauma and resilience, that are responsive to the changing needs and priorities of our Commissioners. KCA office 98.8% of the 12,478 participants who completed KCA evaluation forms between March 2020 and March 2021 said that they would recommend the training to their colleagues At KCA, relationships are key to everything we do – whether that is the relationships between our colleagues that ensure that we feel supported, enthused and committed to our work, the relationships with our commissioners that allow us to understand and respond effectively to their needs, or supporting practitioners, through our training and consultancy, to develop effective connected relationships with the children, families and teams with whom they work. Since 2011 we have delivered training to over 140,000 practitioners across the UK, to promote resilience in the individuals and networks supporting the most vulnerable people in our society. Our quality assurance processes are robust, and we take feedback and evaluation seriously, promoting our own learning and working with our associates to develop their skills. We work with commissioners to build-in effective evaluation systems that enable us to demonstrate impact on learning, confidence and practice and we seek structured feedback from our consultancy customers as each contract is completed. Our Values Knowledge. Change. Action is: Driven by evidence. Drawing on the latest research, we seek to be at the forefront of change and apply new knowledge to real life experiences. Curious. Through offering new perspectives, we ask unique questions that lead to the co-creation of new approaches and partnership. Strengths-based. We seek to unearth the value and contribution that everyone makes, through encouraging people to notice and appreciate their feelings and actions and those of others. Connected. Through intentionally nurturing relationships we seek to grow a culture of mutual trust and respect, creating a sense of safety that encourages innovation and inspires trust in each other’s judgements. Agile and flexible. We work with organisations big or small in creative ways to find new ways of working that meet their changing needs. Congruent. There is consistency between what we say and what we do. This means that nurturing authentic relationships is central to the way our team works, both with colleagues and partners. How we work with others KCA works with others and the community by: Listening to commissioning partners and co-creating with them in equal partnership. Learning with partners and using that new knowledge to proliferate ideas and actions. Building connected relationships through open and honest communication. Acknowledging that vulnerability is part of being human. It affects everyone, but it can disproportionately impact those experiencing inequalities. ● Being gently revolutionary. Acknowledging where power might need to be redistributed to advance inclusion and participation.

London Elite Sports & Football Academy

london elite sports & football academy

London

We are a youth and sports organisations who seek to improve the welfare and wellbeing of all children and young people through organised football/sport training and competitive games, education and social activities of all kinds.Clasford Stirling MBE was invited to establish a youth football team on the Broadwater Farm estate in Tottenham in 1979, which he duly did and called it Broadwater Farm United. Due to his personal commitment and consistency, two key ingredients for success, that first ‘team’ eventually turned into Broadwater Sports & Football Academy, which is still going but with a rebranding to it’s new name, London Elite Sports & Football Academy, which was founded and established by his son, Jude Stirling. As a youth and community advocacy organisation, it has been incredibly successful, supporting several generations of young people against all the odds, to reach their full potential. Clasfords example of care, discipline and clear mentorship as a strong role model, has attracted other skilled volunteer coaches and workers around him, who are also simply motivated to help young people and their parents to understand the transforming principles of great teamwork and cooperation. London Elite are now key providers within Haringey of youth provision projects that target those young people who are struggling against the adverse effects of poverty and low societal expectation, that can often lead young people into anti-social behaviours that are not good for either their own health and wellbeing, or those around them, especially parents who do not know how to overcome the powerful influences of peer pressure exerted upon their children. London Elite have established a model programme to address this vulnerability of young people, called ‘Off The Street, Less Heat’ aimed at providing a safe and secure ‘Drop-In’ place with a range of social and sport activities during late evening hours, in order to offer them alternative activities that are good for them and enhance their skills through training, education and mentoring. Equality has always been at the very heart of all that guides the way forward for Clasford and his team, with a vision of equal access to not only sport, but also education and all other facilities that are available to young people. London Elite, with the funding support of Nike, are now leaders in developing young women’s football, from the age of 10 and up, with our first team entry into a league, happening this season, which is very exciting for all concerned. London Elite exists and operates within a very diverse community and have the privilege of hosting and training children from many ethnic backgrounds, without discrimination, so all of their work is underpinned by the example and policies of the Football Association, especially in terms of promoting the anti-racist principles of their Respect agenda, which apply to not only the coaches, but to players, parents and spectators alike. London Elite’s vision for going forward, is to continue it’s good work and set a strong legacy plan for it’s continuation on into the future, laying the foundation of good strong ‘best practices’, so that anyone who joins the staff will know exactly what their role and aims are and how to achieve them in the best interests of the young people that they are supporting. There is also an idea to extend the vision to develop a one-stop shop for promoting job opportunities, interview training and entrepreneurial development. Partnerships are key to this future success and their collaborations with local schools, Nike, the London borough of Haringey, Spurs and many others, show just what can be achieved once the will and resources are put to good responsible use. London Elite is governed as a non-profit company limited by guarantee, meaning that there are no profits to be taken out of any funding or income that the management team receive, with any excess of income over costs, having to be ploughed straight back into the work of the team in helping young people. Continued long-term and stable funding is hard to come by now, especially with the financial hardships caused by the effects of the pandemic and so any help is much appreciated. London Elite are always seeking to put any funding opportunities to good use for our young people, so if you feel in alignment with our basic aims and objectives, please feel free to contact us at any time with ideas or concrete offers that you may be aware of. We look forward to hearing from you soon!

Courses matching "vulnerability"

Show all 272

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2475

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online + more
£3395

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered Online + more
£595

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2475

BRCGS Vulnerability Assessment for Food Fraud (1 Day)

5.0(1)

By Ask Sonia Limited

Official BRCGS Product Safety Management course: Vulnerability Assessment for Food Fraud. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Vulnerability Assessment for Food Fraud (1 Day)
Delivered Online + more
£325

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3495

Wellness Lab: Embracing vulnerability

5.0(2)

By The Self Leadership Initiative

Learn to use vulnerability to live an authentic and courageous life.

Wellness Lab: Embracing vulnerability
Delivered OnlineFlexible Dates
£10

Vulnerability, Abuse & Safeguarding

4.5(3)

By Studyhub UK

In today's interconnected world, understanding the complex facets of vulnerability and abuse is paramount. Introducing 'Vulnerability, Abuse & Safeguarding', a comprehensive course designed to equip participants with the tools and knowledge to identify, respond, and prevent abuse in a myriad of settings. From diving deep into adult safeguarding systems to comprehending the nuances of whistleblowing, this curriculum ensures a holistic view on the subject, while paying special attention to the principles of safeguarding children, young people, and vulnerable adults. Learning Outcomes Understand the established systems and procedures related to adult safeguarding. Develop skills to effectively respond to suspected or disclosed instances of abuse or neglect. Recognise the importance and procedures of whistleblowing and information dissemination. Gain insights into protective measures for children, young individuals, and the broader spectrum of vulnerable adults. Delve into the intricacies of restrictive practices and the significance of online safety measures. Why buy this Vulnerability, Abuse & Safeguarding course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Vulnerability, Abuse & Safeguarding there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Vulnerability, Abuse & Safeguarding course for? Social workers aiming to expand their safeguarding expertise. Parents or guardians keen to enhance their protective abilities. Teachers and educational professionals striving for a safer classroom environment. Healthcare professionals dedicated to the well-being of their patients. Online moderators and community managers focusing on digital safety. Prerequisites This Vulnerability, Abuse & Safeguarding does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Vulnerability, Abuse & Safeguarding was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Safeguarding Officer: £25,000 - £35,000 Child Welfare Specialist: £28,000 - £40,000 Social Services Manager: £30,000 - £50,000 Health and Safety Officer: £22,000 - £32,000 Safeguarding Consultant: £35,000 - £50,000 Online Safety Advisor: £27,000 - £38,000 Course Curriculum Module 01: Systems & Procedures Relating to Adult Safeguarding Systems & Procedures Relating to Adult Safeguarding 00:13:00 Module 02: Response to Suspected or Disclosed Abuse or Neglect Response to Suspected or Disclosed Abuse or Neglect 00:14:00 Module 03: Whistleblowing and Information Sharing Whistleblowing and Information Sharing 00:14:00 Module 04: Safeguarding a Child or Young Person Safeguarding a Child or Young Person 00:14:00 Module 05: Principles to Safeguard Vulnerable Adults Principles to Safeguard Vulnerable Adults 00:14:00 Module 06: Restrictive Practices, Restraint, Deprivation of Liberty Restrictive Practices, Restraint, Deprivation of Liberty 00:14:00 Module 07: Abuses and Individual Vulnerability and Online Safety Measures Abuses and Individual Vulnerability and Online Safety Measures 00:16:00

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand1 hour 39 minutes
£10.99

Vulnerability, Abuse & Safeguarding

By IOMH - Institute of Mental Health

Overview of Vulnerability, Abuse & Safeguarding Join our Vulnerability, Abuse & Safeguarding course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Vulnerability, Abuse & Safeguarding course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Vulnerability, Abuse & Safeguarding course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This Vulnerability, Abuse & Safeguarding Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Vulnerability, Abuse & Safeguarding. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Vulnerability, Abuse & Safeguarding course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Vulnerability, Abuse & Safeguarding is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Vulnerability, Abuse & Safeguarding course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Vulnerability, Abuse & Safeguarding Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Systems & Procedures Relating to Adult Safeguarding Systems & Procedures Relating to Adult Safeguarding 00:13:00 Module 02: Response to Suspected or Disclosed Abuse or Neglect Response to Suspected or Disclosed Abuse or Neglect 00:14:00 Module 03: Whistleblowing and Information Sharing Whistleblowing and Information Sharing 00:14:00 Module 04: Safeguarding a Child or Young Person Safeguarding a Child or Young Person 00:14:00 Module 05: Principles to Safeguard Vulnerable Adults Principles to Safeguard Vulnerable Adults 00:14:00 Module 06: Restrictive Practices, Restraint, Deprivation of Liberty Restrictive Practices, Restraint, Deprivation of Liberty 00:14:00 Module 07: Abuses and Individual Vulnerability and Online Safety Measures Abuses and Individual Vulnerability and Online Safety Measures 00:16:00

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand1 hour 39 minutes
£11

Vulnerability, Abuse & Safeguarding

4.8(9)

By Skill Up

Master the essentials of Vulnerability, Abuse & Safeguarding. Learn to protect at-risk individuals with practical skills for adult and child safeguarding, whistleblowing, and online safety.

Vulnerability, Abuse & Safeguarding
Delivered Online On Demand2 hours
£10.99