• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

643 Courses delivered Online

Computer Networking and Cyber Security

4.7(160)

By Janets

Register on the Computer Networking and Cyber Security today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Computer Networking and Cyber Security course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Computer Networking and Cyber Security course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Computer Networking and Cyber Security course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.

Computer Networking and Cyber Security
Delivered Online On Demand17 hours 52 minutes
£25

Cyber Security

By The Teachers Training

Cyber Security is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Cyber Security and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 6 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. FUNDAMENTALS OF NETWORKING Network Topologies 00:06:00 History and Applications of Computer Networking 00:06:00 Protocols and Standards 00:04:00 Introduction to OSI Model 00:04:00 Layers of OSI Model 00:07:00 Introduction to TCP/IP Model 00:10:00 OSI Model vs TCP/IP Model 00:04:00 Addressing in Computer Networks 00:09:00 IP Address- IPv4 and IPv6 00:07:00 Classes of IP Address 00:10:00 PRACTICAL : HOW TO FIND OUT YOUR PC's IP ADDRESS 00:03:00 PRACTICAL : HOW TO FIND OUT YOUR PC'S MAC ADDRESS 00:05:00 The Internet Protocol (IP) 00:07:00 Address Resolution Protocol (ARP) 00:09:00 Dynamic Host Configuration Protocol (DHCP) 00:08:00 Internet Control Message Protocol (ICMP) 00:06:00 RIP and OSPF Protocols 00:06:00 PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT 00:03:00 What are Sockets? 00:05:00 File Transfer Protocol (FTP) 00:03:00 Hypertext Transfer Protocol (HTTP) 00:04:00 Domain Name System (DNS) 00:03:00 GETTING STARTED WITH CYBER SECURITY Definition of Computer Security 00:03:00 Interesting Facts about Cyber Security 00:05:00 History of Cyber Security 00:07:00 Scope and Career Insights in Cyber Security 00:08:00 LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY Introduction 00:01:00 Types of Computer Security 00:03:00 Key Terms in Cyber Security 00:07:00 The Elements of Information Security 00:06:00 Types of Attacks 00:10:00 Roles in Cyber Security : Part 1 00:08:00 Roles in Cyber Security : Part 2 00:06:00 DIVING DEEP INTO CYBER SECURITY Security Architect's View of Security 00:08:00 What is Vulnerability Assessment? 00:05:00 4 Phases of Vulnerability Assessment 00:09:00 Introduction to Cryptography 00:06:00 Symmetric Encryption 00:03:00 Asymmetric Encryption 00:04:00 Hashing 00:07:00 Security Organizations 00:05:00 Critical Thinking in Cyber Security 00:04:00 The Five Critical Thinking Skills 00:06:00 PRACTICAL : USING NSLOOKUP TOOL 00:03:00 TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES Different types of Actors in Cyber Security 00:10:00 Types of Cyber Attacks 00:04:00 Hacking Organizations around the Globe 00:05:00 Security Services and Mechanisms 00:03:00 Introduction to Threats 00:03:00 What is a Malware? 00:07:00 Types of Trojans 00:06:00 Types of Virus 00:07:00 Have you ever heard about a Ransomware? 00:09:00 The Cyber Kill Chain 00:09:00 Introduction to Social Engineering 00:05:00 Types of Social Engineering 00:07:00 KEY SECURITY CONCEPTS Confidentiality - The Most Important Element of Security 00:04:00 Introduction to Incident Response Team 00:05:00 Phases of Incident Response 00:05:00 Laws in Cyber Security 00:05:00 What are Audits in Cyber Security 00:04:00 Internal Audit vs External Audit 00:04:00 The NIST Framework 00:03:00 The COBIT Framework 00:04:00 FIREWALLS AND ANTIVIRUS Intrusion Detection System 00:05:00 Introduction to Firewalls 00:05:00 What is DMZ? 00:04:00 Different types of Firewalls 00:09:00

Cyber Security
Delivered Online On Demand6 hours 25 minutes
£27.99

IT Security Course

4.3(43)

By John Academy

Course Overview With the advancement of the IT sector, security issues are also rising day by day. Expert professionals are in high demand in order to tackle the threats. If you are an aspiring IT professional, make sure you are well-equipped with the key IT security skills. Our IT Security Course can help you out.  From this course, you will learn the essentials of IT security. The course will help you understand the core security policies and procedures. In addition, the course will describe the essential aspects of network security, operations systems security and web security. The engaging modules will help you enhance your understanding of wireless security and advanced technology used in IT security.  Upon successful completion of the course you will receive a certificate of achievement. This certificate will increase your employability and open doors to new opportunities. Join now! Course Preview Learning Outcomes Learn the fundamentals and key concepts of IT security Enhance your understanding of security policies and procedures Understand the basics of network security, operating systems security and web security Grasp the skills required to ensure wireless security Familiarise yourself with the new trends in network security Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Meticulously crafted engaging and informative tutorial videos and materials Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. What Skills will You Learn from This Course? IT Security Network Security Operating System Security Wireless Security Who Should Take This IT Security Course? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This IT Security Course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ This exclusive IT Security Course will equip you with effective skills and abilities and help you explore career paths such as  Security Analyst Cybersecurity Manager IT Security Auditor Security Architect Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

IT Security Course
Delivered Online On Demand1 hour 56 minutes
£24.99

Linux Security and Hardening

4.7(160)

By Janets

Description Register on the Linux Security and Hardening today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Linux Security and Hardening course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Course Content Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Protected: Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Protected: Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Protected: Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Protected: Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 Protected: File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 Protected: File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment -Linux Security and Hardening 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£25

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1

4.8(9)

By Skill Up

Become a networking expert with Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training. Learn to build and manage networks of all sizes, from simple to complex.

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1
Delivered Online On Demand18 hours 23 minutes
£25

Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training

4.8(9)

By Skill Up

Transform yourself into a promising network engineer who loves to do troubleshooting. Learn Troubleshooting Basic Connectivity, Wide-Area Networks, and Network Device Management.

Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training
Delivered Online On Demand17 hours 23 minutes
£25

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

Cisco Security Core Technologies: SCOR Training

By Course Cloud

Certification After successfully completing the course, you will be able to get the UK and internationally accepted certificate to share your achievement with potential employers or include it in your CV. The PDF Certificate + Transcript is available at £6.99 (Special Offer - 50% OFF). In addition, you can get a hard copy of your certificate for £12 (Shipping cost inside the UK is free, and outside the UK is £9.99).

Cisco Security Core Technologies: SCOR Training
Delivered Online On Demand
£25

Certified Wireless Security Professional (CWSP) - Complete Video Course

4.3(43)

By John Academy

Description: CWSP is a professional level certification for network engineers who seek to establish their expertise in enterprise Wi-Fi security. Contrary to popular belief, enterprise Wi-Fi can be secure, if the IT pros installing and configuring it understand how to secure the wireless network. This Certified Wireless Security Professional (CWSP) - Complete Video Course covers the functions and features of Certified Wireless Security Professional. In this course, you will learn the basics of WLAN security, Legacy security, encryption ciphers and methods, 802.11 authentication methods. You will learn about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. You will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, and WLAN security infrastructure. You are welcome to join this course to learn more and improve your skills and knowledge. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Wireless Security Professional (CWSP) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Wireless Security Professional (CWSP) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. WLAN Security Overview WLAN Security Overview and Data Privacy 00:58:00 Networking Basics 00:04:00 Web GUI Introduction 00:05:00 Security Options 00:03:00 Legacy Security Legacy Security 00:32:00 VPNs 00:21:00 Security Association 00:09:00 MAC Spoofing 00:07:00 Encryption Ciphers and Methods Encryption Ciphers and Methods 00:19:00 TKIP 00:26:00 CCMP 00:20:00 Encryption Examples 00:06:00 802.11 Authentication Methods 802.11 Authentication Methods 00:26:00 802.1X 00:20:00 EAP 00:25:00 Certified Authority Server Credentials 00:06:00 Dynamic Encryption Key Generation Dynamic Encryption Key Generation 00:21:00 Authentication and Key Management 00:13:00 RSNA Key Hierarchy 00:12:00 EAP 00:05:00 Information Elements 00:06:00 SOHO 802.11 Security SOHO 802.11 Security 00:26:00 Wi-Fi Protected Setup (WPS) 00:20:00 Cracking Hashes 00:09:00 Fast Secure Roaming Fast Secure Roaming 00:24:00 PMKSA 00:29:00 FT Key Hierarchy (e-notes) 00:30:00 802.11K-2008 00:28:00 Wireless Security Risks Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless LAN Security Auditing Wireless LAN Security Auditing 00:28:00 Wireless Security Monitoring Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 VPNs, Remote Access and Guest Access Services VPNs, Remote Access and Guest Access Services 00:23:00 Remote Access 00:14:00 WLAN Security Infrastructure WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Wireless Security Policies Wireless Security Policies 00:17:00 Other Policies 00:14:00 Mock Exam Mock Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Wireless Security Professional (CWSP) - Complete Video Course
Delivered Online On Demand13 hours 31 minutes
£24

Certified Penetration Testing Engineer (CPTE) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Penetration Testing Engineer (CPTE) - Complete Video Course covers everything you need to know about becoming a Certified Penetration Testing Engineer. In this course you will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers and will increase the ability to identify protection and reduce any risks that could be there for hackers to take advantage of. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Penetration Testing Engineer (CPTE) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Penetration Testing Engineer (CPTE) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Logistics of Pen Testing Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals Linux Fundamentals 00:22:00 Information Gathering Information Gathering 00:38:00 Detecting Live Systems Detecting Live Systems 00:34:00 Enumeration Enumeration 00:25:00 Vulnerability Assessments Vulnerability Assessments 00:20:00 Malware Goes Undercover Malware Goes Undercover 00:28:00 Windows Hacking Windows Hacking 00:39:00 Hacking UNIX/Linux Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS Networks, Sniffing and IDS 00:42:00 Injecting the Database Injecting the Database 00:26:00 Attacking Web Technologies Attacking Web Technologies 00:30:00 Project Documentation Project Documentation 00:17:00 Mock Exam Mock Exam- Certified Penetration Testing Engineer (CPTE) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Penetration Testing Engineer (CPTE) - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Penetration Testing Engineer (CPTE) - Complete Video Course
Delivered Online On Demand8 hours 4 minutes
£23