• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

453 Courses delivered Online

Level 2 Diploma in Cyber Security

By Online Training Academy

Cyber security is of paramount importance in the digital age, serving as a vital shield against ever-evolving Cyber security threats. In the UK, its significance is underscored by a burgeoning demand fueled by a surge in Cyber security attacks and digital vulnerabilities. With a projected increase of 25% in cyber incidents annually, the need for skilled cyber security professionals is escalating rapidly. This demand translates into abundant job opportunities across various sectors, ranging from government agencies to private enterprises. Moreover, cyber security roles offer competitive salaries, with entry-level positions starting at around £30,000 per year and experienced professionals commanding salaries well over £60,000 annually. Embracing a career in cyber security not only presents a chance to contribute to safeguarding digital infrastructure but also offers the prospect of a lucrative and rewarding profession in a field that is continually expanding and evolving. Key Features This Level 2 Diploma in Cyber Security Course Includes: This Level 2 Diploma in Cyber Security Course is CPD Certified Free Certificate from Reed CIQ Approved Cyber security Course. Level 2 Diploma Developed by Specialist Lifetime Access From our Cyber security course, you will learn about cyber security, cyber attacks types, cybercrimes overview & password management . So, stand out in the job market by completing the Cyber Security course. Get an certificate and add it to your resume to impress your employers. Course Curriculum Level 2 Diploma in Cyber Security Course: Module 01: Fundamentals of Cyber Security Module 02: Types of Cyber Attacks Module 03: Cybercrimes Overview Module 04: Cyber Security and Data Breach Incidents Module 05: Best Practices in Password Management Learning Outcomes Diploma in Cyber Security Level 2 & 3 Course : Understanding Cyber Threats: Recognize various cyber threats and their implications on Cyber security. Cybercrime Awareness: Grasp the concepts and types of cybercrimes prevalent today. Data Breach Management: Acquire skills to respond to and prevent data breaches. Effective Password Practices: Implement secure password management techniques proficiently. Safe Internet Navigation: Demonstrate safe internet browsing practices for personal and professional use. Security in Remote Work: Apply Cyber security measures for office and remote work environments effectively. Certification After completing this Diploma in Cyber Security Level 2 & 3course, you will get a free certificate. Please note: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. CPD 10 CPD hours / points Accredited by The CPD Certification Service Level 2 Diploma in Cyber Security 1:23:55 1: Module 01: Fundamentals of Cyber Security 12:15 2: Module 02: Types of Cyber Attacks 10:27 3: CyberSec Module 02 05:00 4: Module 03: Cybercrimes Overview 12:55 5: CyberSec Module 03 07:00 6: Module 04: Cyber Security and Data Breach Incidents 14:21 7: CyberSec Module 04 05:00 8: Module 05: Best Practices in Password Management 10:57 9: CyberSec Module 05 05:00 10: CPD Certificate - Free 01:00 Who is this course for? Level 2 Diploma in Cyber Security Course Individuals aspiring to enter the cyber security field. Employees seeking to enhance their cyber security awareness. IT professionals aiming to specialise in cyber security. Students pursuing a career in information technology or cyber security. Anyone concerned about personal and professional cyber security. NB: This Course doesn't provide any professional qualifications. For professional qualifications, you may like to choose: Level 2 Diploma in Business Beginners in Cyber Security Level 4 Diploma in Cyber Security Level 5 Diploma in Cyber Security NCFE Level 2 Certificate in the Principles of Cyber Security Level 3 Diploma in Cyber Security Management and Operations Career path Level 2 Diploma in Cyber Security Course Cyber Security Analyst IT Security Consultant Network Security Engineer Incident Response Specialist Data Security Administrator Security Compliance Officer Certificates Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Level 2 Diploma in Cyber Security
Delivered Online On Demand1 hour 24 minutes
£12

Level 2 Diploma in Cyber Security

By Online Training Academy

Cyber security is of paramount importance in the digital age, serving as a vital shield against ever-evolving Cyber security threats. In the UK, its significance is underscored by a burgeoning demand fueled by a surge in Cyber security attacks and digital vulnerabilities. With a projected increase of 25% in cyber incidents annually, the need for skilled cyber security professionals is escalating rapidly. This demand translates into abundant job opportunities across various sectors, ranging from government agencies to private enterprises. Moreover, cyber security roles offer competitive salaries, with entry-level positions starting at around £30,000 per year and experienced professionals commanding salaries well over £60,000 annually. Embracing a career in cyber security not only presents a chance to contribute to safeguarding digital infrastructure but also offers the prospect of a lucrative and rewarding profession in a field that is continually expanding and evolving. Key Features This Level 2 Diploma in Cyber Security Course Includes: This Level 2 Diploma in Cyber Security Course is CPD Certified Free Certificate from Reed CIQ Approved Cyber security Course. Level 2 Diploma Developed by Specialist Lifetime Access From our Cyber security course, you will learn about cyber security, cyber attacks types, cybercrimes overview & password management . So, stand out in the job market by completing the Cyber Security course. Get an certificate and add it to your resume to impress your employers. Course Curriculum Level 2 Diploma in Cyber Security Course: Module 01: Fundamentals of Cyber Security Module 02: Types of Cyber Attacks Module 03: Cybercrimes Overview Module 04: Cyber Security and Data Breach Incidents Module 05: Best Practices in Password Management Learning Outcomes Diploma in Cyber Security Level 2 & 3 Course : Understanding Cyber Threats: Recognize various cyber threats and their implications on Cyber security. Cybercrime Awareness: Grasp the concepts and types of cybercrimes prevalent today. Data Breach Management: Acquire skills to respond to and prevent data breaches. Effective Password Practices: Implement secure password management techniques proficiently. Safe Internet Navigation: Demonstrate safe internet browsing practices for personal and professional use. Security in Remote Work: Apply Cyber security measures for office and remote work environments effectively. Certification After completing this Diploma in Cyber Security Level 2 & 3course, you will get a free certificate. Please note: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. CPD 10 CPD hours / points Accredited by The CPD Certification Service Level 2 Diploma in Cyber Security 1:23:55 1: Module 01: Fundamentals of Cyber Security 12:15 2: Module 02: Types of Cyber Attacks 10:27 3: CyberSec Module 02 05:00 4: Module 03: Cybercrimes Overview 12:55 5: CyberSec Module 03 07:00 6: Module 04: Cyber Security and Data Breach Incidents 14:21 7: CyberSec Module 04 05:00 8: Module 05: Best Practices in Password Management 10:57 9: CyberSec Module 05 05:00 10: CPD Certificate - Free 01:00 Who is this course for? Level 2 Diploma in Cyber Security Course Individuals aspiring to enter the cyber security field. Employees seeking to enhance their cyber security awareness. IT professionals aiming to specialise in cyber security. Students pursuing a career in information technology or cyber security. Anyone concerned about personal and professional cyber security. NB: This Course doesn't provide any professional qualifications. For professional qualifications, you may like to choose: Level 2 Diploma in Business Beginners in Cyber Security Level 4 Diploma in Cyber Security Level 5 Diploma in Cyber Security NCFE Level 2 Certificate in the Principles of Cyber Security Level 3 Diploma in Cyber Security Management and Operations Career path Level 2 Diploma in Cyber Security Course Cyber Security Analyst IT Security Consultant Network Security Engineer Incident Response Specialist Data Security Administrator Security Compliance Officer Certificates Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Level 2 Diploma in Cyber Security
Delivered Online On Demand1 hour 24 minutes
£12

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber Security Awareness Level 4

5.0(1)

By Course Gate

Level up your Cyber Security knowledge with our comprehensive Level 4 course. Explore Cyber Attacks, Data Breaches, Password Management, and more. Perfect for professionals and individuals keen on digital security.

Cyber Security Awareness Level 4
Delivered Online On Demand3 hours
£11.99

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Microsoft Outlook Mastering Program

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum You Can Master Microsoft Outlook You Can Master Microsoft Outlook Promo 00:02:00 You Can Ask Me Anytime 00:01:00 Your Facebook Support Group 00:01:00 Quick Win - How To Send an Email in Outlook 00:01:00 Quick Win - How To Print an Email in Outlook 00:01:00 Another Quick Win - You Can Work Offline With Outlook 00:01:00 Getting Started With Outlook Outlook Environment 00:03:00 Outlook Opening 00:02:00 Outlook Interface Options 00:04:00 Sending and Receiving Email in Outlook 00:03:00 Sending and Receiving Email in Outlook with Attachments 00:02:00 File Menu Account Settings in Outlook 00:06:00 Automatic Replies in Outlook 00:04:00 Mail Box Settings in Outlook 00:02:00 Rules and Alerts Settings in Outlook 00:04:00 Exporting and Importing Rules and Alerts in Outlook 00:01:00 Opening Options in File Outlook 00:04:00 Home - New Email in Outlook Quick Win - How To Create Folder in Outlook 00:01:00 Quick Win - How To Change Outlook Style 00:01:00 Quick Win - How To Use Quick Access Toolbar 00:01:00 New Email Options in Outlook 00:03:00 Clipboard in New Email 00:05:00 Basic Text in New Email 00:07:00 Name, Include and Tags in New Email 00:03:00 Inserting Table Into New Email 00:10:00 Inserting Images Into New Email 00:10:00 Inserting Shapes Into New Email 00:06:00 Inserting SmartArt Into New Email 00:04:00 Inserting New Chart Into New Email 00:05:00 Taking Screenshot Into New Email 00:02:00 Links, Text and Symbol 00:03:00 Themes, Show Fields, Encrypt, Tracking and More Options in New Email 00:03:00 Formatting Text in New Emails 00:03:00 Text Style in New Email 00:04:00 Reviewing Menu in New Email 00:03:00 Home - New Appointment New Appointment at Home Menu 00:06:00 Home - New Meeting New Meeting at Home Menu 00:01:00 Home - New Contact New Contact in Home Menu 00:05:00 Home - New Task Create New Task 00:03:00 Other New Item in Home 00:02:00 Home - Other Functions Email Deletion in Outlook 00:02:00 Responding to A Email in Outlook 00:02:00 Quick Steps, Tag and Other Functions 00:03:00 Send and Receive Complete Guide of Send and Receive 00:03:00 Home - Folder Complete Folder Guide 00:05:00 Review and Outlook View and Help in Outlook 00:04:00 Options Options Intro 00:03:00 General Options in Outlook 00:05:00 Mail Options in Outlook 00:06:00 Calendar Options in Outlook 00:03:00 Contact Options in Outlook 00:01:00 Task Options in Outlook 00:01:00 Search Options in Outlook 00:02:00 Language Options in Outlook 00:02:00 Ease of Access Options in Outlook 00:02:00 Advanced Option in Outlook 00:04:00 Ribbon and Quick Access Toolbar Customization 00:02:00 Security Is Everything Quick Win - Create Unknown Password 00:01:00 Security Is Everthing 00:01:00 Quick Win - Insecurity Is Coming from You And Others 00:01:00 Understand Security Type or Category 00:02:00 Life Savers - You Should Know These 00:04:00 Have Proper Password - Start Securing You Now 00:03:00 Don't Use the Same Password Anymore 00:02:00 Should You Use Longer Password or Complicated! 00:03:00 Last-Pass & Authy Mobile App 00:02:00 The Best and Only Solution to Make and Keep Password Un-Crack-Able 00:08:00 Lastpass Setup and Configure 00:10:00 Last-Pass Options Part 1 00:03:00 Last-Pass Options Part 2 00:04:00 Last-Pass Option Part 3 00:04:00 2FA Makes You Even Stronger in Password 00:05:00 Security Is Everything, Keep Secured Your Devices 00:07:00 Security on Your Data and Privacy 00:08:00 Conclusion Congratulations 00:01:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Microsoft Outlook Mastering Program
Delivered Online On Demand
£19

The Complete Microsoft Outlook Masterclass

4.9(27)

By Apex Learning

Overview This comprehensive course on The Complete Microsoft Outlook Masterclass will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This The Complete Microsoft Outlook Masterclass comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this The Complete Microsoft Outlook Masterclass. It is available to all students, of all academic backgrounds. Requirements Our The Complete Microsoft Outlook Masterclass is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more!   Course Curriculum 16 sections • 74 lectures • 04:03:00 total length •You Can Master Microsoft Outlook Promo: 00:02:00 •You Can Ask Me Anytime: 00:01:00 •Your Facebook Support Group: 00:01:00 •Quick Win -How To Send an Email in Outlook: 00:01:00 •Quick Win - How To Print an Email in Outlook: 00:01:00 •Another Quick Win - You Can Work Offline with Outlook: 00:01:00 •Outlook Environment: 00:03:00 •Outlook Opening: 00:02:00 •Outlook Interface Options: 00:04:00 •Sending and Receiving Email in Outlook: 00:03:00 •Sending and Receiving Email in Outlook with Attachments: 00:02:00 •Account Settings in Outlook: 00:06:00 •Automatic Replies in Outlook: 00:04:00 •Mail Box Settings in Outlook: 00:02:00 •Rules and Alerts Settings in Outlook: 00:04:00 •Exporting and Importing Rules and Alerts in Outlook: 00:01:00 •Opening Options in File Outlook: 00:04:00 •Quick Win -How to Create Folder in Outlook: 00:01:00 •Quick Win -How to Change Outlook Style: 00:01:00 •Quick Win - How To Use Quick Access Toolbar: 00:01:00 •New Email Options in Outlook: 00:03:00 •Basic Text in New Email: 00:07:00 •Name, Include and Tags in New Email: 00:03:00 •Inserting Table Into New Email: 00:10:00 •Inserting Images Into New Email: 00:10:00 •Inserting Shapes Into New Email: 00:06:00 •Inserting SmartArt Into New Email: 00:04:00 •Inserting New Chart Into New Email: 00:05:00 •Taking Screenshot Into New Email: 00:02:00 •Links, Text and Symbol: 00:03:00 •Themes, Show Fields, Encrypt, Tracking and More Options in New Email: 00:03:00 •Formatting Text in New Emails: 00:03:00 •Reviewing Menu in New Email: 00:03:00 •New Appointment at Home Menu: 00:06:00 •New Meeting at Home Menu: 00:01:00 •New Contact in Home Menu: 00:05:00 •Create New Task: 00:03:00 •Other New Item in Home: 00:02:00 •Email Deletion in Outlook: 00:02:00 •Responding to An Email in Outlook: 00:02:00 •Quick Steps, Tag and Other Functions: 00:03:00 •Complete Guide of Send and Receive: 00:03:00 •Complete Folder Guide: 00:05:00 •View and Help in Outlook: 00:04:00 •Options Intro: 00:03:00 •General Options in Outlook: 00:05:00 •Mail Options in Outlook: 00:06:00 •Calendar Options in Outlook: 00:03:00 •Contact Options in Outlook: 00:01:00 •Task Options in Outlook: 00:01:00 •Search Options in Outlook: 00:02:00 •Language Options in Outlook: 00:02:00 •Ease of Access Options in Outlook: 00:02:00 •Advanced Option in Outlook: 00:04:00 •Ribbon and Quick Access Toolbar Customization: 00:02:00 •Quick Win - Create Unknown Password: 00:01:00 •Security Is Everything: 00:01:00 •Quick Win - Insecurity Is Coming from You and Others: 00:01:00 •Understand Security Type or Category: 00:02:00 •Life Savers - You Should Know These: 00:04:00 •Have Proper Password - Start Securing You Now: 00:03:00 •Don't Use the Same Password Anymore: 00:02:00 •Should You Use Longer Password or Complicated!: 00:03:00 •Last-Pass & Authy Mobile App: 00:02:00 •The Best and Only Solution to Make and Keep Password Un-Crack-Able: 00:08:00 •Last-pass Setup and Configure: 00:10:00 •Last-Pass Options Part 1: 00:03:00 •Last-Pass Options Part 2: 00:04:00 •Last-Pass Option Part 3: 00:04:00 •2FA Makes You Even Stronger in Password: 00:05:00 •Security Is Everything, Keep Secured Your Devices: 00:07:00 •Security on Your Data and Privacy: 00:08:00 •Congratulation: 00:01:00 •Assignment -The Complete Microsoft Outlook Masterclass: 00:00:00

The Complete Microsoft Outlook Masterclass
Delivered Online On Demand4 hours 3 minutes
£12

Concise Cisco switching

5.0(3)

By Systems & Network Training

Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.

Concise Cisco switching
Delivered in Internationally or OnlineFlexible Dates
£1,497

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497