• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

272 Courses delivered Online

CompTIA PenTest+ (PenTest)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA PenTest+ (PenTest)
Delivered OnlineFlexible Dates
£3295

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£24

Vulnerable Customer Management - 2023

5.0(4)

By LGCA | London Governance and Compliance Academy

Description For some years, the UK financial regulators have been placing expectations on firms to treat their customers fairly and with plenty of care. This includes vulnerable clients, or those defined by the FCA as individuals 'who, due to their personal circumstances, [are] especially susceptible to detriment, particularly when a firm is not acting with appropriate levels of care.' Throughout this course, you will gain insight into the definition of vulnerable clients and how your company can better cater to this group's needs, preferences, and personalities. More specifically, by the end of this course, you will be able to:  Know how vulnerable customer management started.  Understand what vulnerability means.  Recognise traits of vulnerability.  Demonstrate an awareness of the 4 key pillars of vulnerability and how the UK financial regulators think you can help manage vulnerable customers in your organisation. Training Duration This course may take up to 2 hours to be completed. However, actual study time differs as each learner uses their own training pace. Training Method The course is offered fully online using a self-paced approach. The learning units consist of reading material. Learners may start, stop and resume their training at any time. At the end of each session, participants take a Quiz to complete their learning unit and earn a Certificate of Completion upon completion of all units. Accreditation and CPD Recognition This programme has been developed by the London Governance and Compliance Academy (LGCA), a UK-recognised training institution. Registration and Access To register to this course, click on the Get this course button to pay online and receive your access instantly. If you are purchasing this course on behalf of others, please be advised that you will need to create or use their personal profile before finalising your payment. If you wish to receive an invoice instead of paying online, please contact us at info@lgca.uk.

Vulnerable Customer Management - 2023
Delivered Online On Demand
£60

Certified Ethical Hacking - Complete Video Training

4.3(43)

By John Academy

Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Ethical Hacking - Complete Video Training
Delivered Online On Demand14 hours 5 minutes
£24

Security Analyst Training

By Online Training Academy

Are you ready to dive into the world of cybersecurity and become a skilled Security Analyst? Our Security Analyst Training course is meticulously designed to provide you with the knowledge and expertise needed to protect and defend against the ever-evolving threat landscape. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access The Security Analyst Training course provides a comprehensive understanding of the role and responsibilities of a security analyst. Learners will explore the current threat landscape, identifying and assessing risks that organizations face. The course covers various types and phases of penetration testing, offering hands-on experience in identifying vulnerabilities. Participants will learn about key methodologies and guidelines for maintaining security, as well as the importance of policies and procedures. The curriculum also includes auditing techniques for vulnerability assessments and penetration tests, and interpreting the results of these tests to enhance security measures. By the end of the course, learners will have practical skills and knowledge to effectively protect and secure organizational systems. Course Curriculum Module 01: What is a Security Analyst - Part 1 Module 02: What is a Security Analyst - Part 2 Module 03: What is a Security Analyst - Part 3 Module 04: Threat Landscape - Part 1 Module 05: Threat Landscape - Part 2 Module 06: Threat Landscape - Part 3 Module 07: Risk Assessment - Part 1 Module 08: Risk Assessment - Part 2 Module 09: Risk Assessment - Part 3 Module 10: Types and Phases of Penetration Testing - Part 1 Module 11: Types and Phases of Penetration Testing - Part 2 Module 12: Types and Phases of Penetration Testing - Part 3 Module 13: Methodologies and Guidelines - Part 1 Module 14: Methodologies and Guidelines - Part 2 Module 15: Methodologies and Guidelines - Part 3 Module 16: Policies and Procedures - Part 1 Module 17: Policies and Procedures - Part 2 Module 18: Policies and Procedures - Part 3 Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 Module 22: Penetration Testing Results - Part 1 Module 23: Penetration Testing Results - Part 2 Module 24: Penetration Testing Results - Part 3 Learning Outcomes: Understand roles and responsibilities of a security analyst. Identify current and emerging threats in the threat landscape. Conduct comprehensive risk assessments and risk management. Execute penetration tests through various types and phases. Apply methodologies and guidelines in security analysis. Develop and implement security policies and procedures. CPD 10 CPD hours / points Accredited by CPD Quality Standards Security Analyst Training 4:06:52 1: Module 01: What is a Security Analyst - Part 1 Preview 00:29 2: Module 02: What is a Security Analyst - Part 2 00:24 3: Module 03: What is a Security Analyst - Part 3 42:38 4: Module 04: Threat Landscape - Part 1 00:26 5: Module 05: Threat Landscape - Part 2 00:32 6: Module 06: Threat Landscape - Part 3 16:07 7: Module 07: Risk Assessment - Part 1 00:34 8: Module 08: Risk Assessment - Part 2 00:38 9: Module 09: Risk Assessment - Part 3 23:01 10: Module 10: Types and Phases of Penetration Testing - Part 1 00:28 11: Module 11: Types and Phases of Penetration Testing - Part 2 00:32 12: Module 12: Types and Phases of Penetration Testing - Part 3 27:37 13: Module 13: Methodologies and Guidelines - Part 1 00:36 14: Module 14: Methodologies and Guidelines - Part 2 00:28 15: Module 15: Methodologies and Guidelines - Part 3 37:27 16: Module 16: Policies and Procedures - Part 1 00:37 17: Module 17: Policies and Procedures - Part 2 00:23 18: Module 18: Policies and Procedures - Part 3 35:05 19: Module 19: Auditing Vulnerability Assessment and Pen Test - Part 1 00:19 20: Module 20: Auditing Vulnerability Assessment and Pen Test - Part 2 00:30 21: Module 21: Auditing Vulnerability Assessment and Pen Test - Part 3 23:50 22: Module 22: Penetration Testing Results - Part 1 00:44 23: Module 23: Penetration Testing Results - Part 2 00:33 24: Module 24: Penetration Testing Results - Part 3 31:54 25: CPD Certificate - Free 01:00 Who is this course for? This Security Analyst Training course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Security Analyst Training. Moreover, this course is ideal for: Aspiring security analysts seeking foundational knowledge. IT professionals transitioning to security roles. Managers responsible for cybersecurity. Students pursuing cybersecurity degrees. Security enthusiasts aiming to enhance their skills. Requirements There are no requirements needed to enrol into this Security Analyst Training course. We welcome individuals from all backgrounds and levels of experience to enrol into this Security Analyst Training course. Career path After finishing this Security Analyst Training course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Security Analyst Training are: Security Analyst Penetration Tester Risk Assessor Vulnerability Auditor Cybersecurity Consultant Information Security Officer Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Security Analyst Training
Delivered Online On Demand5 minutes
£12

CPD Accredited Threat Management TACCP (2-3 hours)

5.0(1)

By Ask Sonia Limited

CPD accredited Threat Management TACCP course. Delivered online (Zoom) by a live tutor. Exam and Certificate fee included in the price.

CPD Accredited Threat Management TACCP (2-3 hours)
Delivered Online + more
£80

BRCGS Professional 3-Day Fast Track (3 Days)

5.0(36)

By Ask Sonia Limited

Official BRCGS Professional 3-Day Fast Track program. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Professional 3-Day Fast Track (3 Days)
Delivered Online + more
£735

Cyber Security Officer Training - Complete Video Course

4.3(43)

By John Academy

Description: The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity. The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Ethical Hacking Overview FREE 00:35:00 Reconnaissance 00:25:00 Protocols 01:25:00 Windows Hacking 01:19:00 Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks 01:34:00 Professional Hacking Security Fundamentals FREE 00:51:00 Access Controls 00:33:00 Protocols 00:36:00 Cryptography 00:52:00 Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access 00:31:00 Maintaining Access 00:17:00 Covering Tracks 00:18:00 Malware 00:09:00 Buffer Overflows 00:22:00 Password Cracking 00:33:00 Penetration Testing I Packet Capturing 00:38:00 Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays 00:20:00 IPv6 Attacks 00:49:00 VPN Attacks 00:38:00 Defeating SSL 00:48:00 IDS/IPS Evasion 01:11:00 Penetration Testing II Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals 00:22:00 Information Gathering 00:38:00 Detecting Live Systems 00:34:00 Enumeration 00:25:00 Vulnerability Assessments 00:20:00 Malware Goes Undercover 00:28:00 Windows Hacking 00:39:00 Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS 00:42:00 Injecting the Database 00:26:00 Attacking Web Technologies 00:30:00 Project Documentation 00:17:00 Web Application Security Web Application Security FREE 01:20:00 Secure SDLC 00:26:00 OWASP TOP 10 00:28:00 Risk Management 00:35:00 Threat Modeling 00:18:00 Authentication and Authorization Attacks 00:24:00 Session Management 00:35:00 Security Architecture 00:29:00 Input Validation and Data Sanitization 00:24:00 AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping 00:07:00 Cryptography 00:28:00 Testing Methodologies 00:31:00 Security Leadership Security Management FREE 00:58:00 Risk Management 00:35:00 Encryption 00:31:00 Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence 01:01:00 Operations Security 00:48:00 Knowing Network Security 01:12:00 Security Sentinel Basic Security FREE 00:17:00 User Awareness 00:27:00 Implementing Countermeasures 00:09:00 Certified Security Sentinel 00:16:00 Using the Internet at Work 00:23:00 Accessing the Company's Network Through Your Assigned Computer 00:19:00 Accessing the Corporate Network Remotely 00:09:00 Social Engineering 00:13:00 Understanding and Manipulating our Target 00:16:00 Researching Our Target 00:11:00 Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types 00:23:00 Assessing the Network 00:40:00 Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis 00:12:00 Mock Exam Mock Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Final Exam Final Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Cyber Security Officer Training - Complete Video Course
Delivered Online On Demand46 hours
£22

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3497

Offensive Hacking Unfolded - Become a Pro Pentester

By Packt

A beginner-friendly course for aspiring pentesters with 10+ hours of applied ethical hacking and security content covering core concepts such as using VMware, basics of Linux, Nmap, Metasploit, privilege escalation, known vulnerabilities, SQL injections, pivoting, cracking passwords, and much more. You need to know the basics of Linux and networking to get started.

Offensive Hacking Unfolded - Become a Pro Pentester
Delivered Online On Demand10 hours 19 minutes
£82.99