Overview This comprehensive course on Bodyguard Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Bodyguard Training comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Bodyguard Training. It is available to all students, of all academic backgrounds. Requirements Our Bodyguard Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 18 sections • 18 lectures • 08:33:00 total length •Introduction to Bodyguard Training: 00:31:00 •Personal Security: 00:19:00 •Laws and Legislation: 00:25:00 •Threat Assessment and Risk Management: 00:34:00 •Operational Planning: 00:25:00 •Behavioural Intelligence: 00:17:00 •Anti-Ambush Drills: 00:41:00 •Searching Techniques: 00:35:00 •On Foot Protection: 00:48:00 •Physical Intervention: 00:24:00 •Vehicle Escort Procedures: 00:34:00 •Route Reconnaissance: 00:27:00 •Surveillance and Basic Anti Surveillance Techniques: 00:44:00 •Firearms and Explosive Handling: 00:28:00 •Protectee Variations: 00:18:00 •Medical Emergency Assistance: 00:40:00 •How COVID-19 Affected Close Protection Services: 00:23:00 •Assignment - Bodyguard Training: 00:00:00
Overview This comprehensive course on Private Detective Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Private Detective Training comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Private Detective Training. It is available to all students, of all academic backgrounds. Requirements Our Private Detective Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 20 sections • 20 lectures • 08:23:00 total length •An Introduction to the Concept of Being a Private Detective: 00:17:00 •Private Investigation Process: 00:27:00 •Classification of Crime: 00:29:00 •Starting an Investigation: 00:19:00 •Crime Scene Investigation and Photography (Part 1): 00:24:00 •Crime Scene Investigation and Photography (Part 2): 00:32:00 •Evidence Collection: 00:34:00 •Locating Missing People: 00:23:00 •Interview and Interrogation Techniques: 00:35:00 •Methods of Identification and Sources of Information: 00:27:00 •Fingerprint Verification: 00:30:00 •Handwriting Examination: 00:34:00 •Linking and Surveillance of Suspect: 00:31:00 •Counter-Espionage and Counter-Surveillance: 00:23:00 •Domestic Investigation and Types: 00:19:00 •Basic Operations of Firearms: 00:31:00 •Preparing Case Report: 00:27:00 •Code of Ethics: 00:19:00 •Operating a Private Investigation Business: 00:22:00 •Assignment - Private Detective Training: 00:00:00
Course Overview: Did you know 70% of organisations reported a cybersecurity breach last year? Network Security Level 2 is more than just a course; it invests in a safer digital future. This curriculum offers a meticulous journey, delving deeper into network security. From understanding the intricacies of Security and Risk Management to Security Operations, this course ensures comprehensive coverage. Whether you're keen on mastering Asset Security, seeking profound knowledge in Security Engineering, or aiming to understand the dynamics of Communication and Network Security, Identity and Access Management, Security Assessment and Testing, or Software Development Security, this course is tailored to equip you with the advanced knowledge necessary for the cybersecurity challenges of tomorrow. Take action now. Stay ahead of the curve, safeguard sensitive data, and become a beacon of trust in cybersecurity. Enrol today! Key Features of the Course: Awarded a CPD certificate upon completion. 24/7 Learning Assistance to ensure uninterrupted progress. Engaging learning materials designed by top industry experts. Who is This Course For? This Network Security Level 2 course is Ideal for professionals who have completed foundational courses in network security and are looking to further enhance their skills and knowledge. Learning Outcome Acquire an in-depth understanding of security protocols. Delve into Security and Risk Management. Understand the essence of Asset Security. Engineer robust security measures. Master Communication and Network Security. Manage Identity and Access effectively. Conduct Security Assessment and Testing proficiently. Implement efficient Security Operations. Secure software through development practices. Why Enrol in This Course: Stay ahead in the cybersecurity realm. This top-reviewed course, recently updated, is trending and empowers you with the skills to counteract the ever-evolving world of network threats. Requirements: Basic knowledge of network security principles. Completion of a foundational course in network security or equivalent experience. Career Path: Upon completion of this Network Security Level 2 course, professionals can explore numerous roles, such as: Security Analyst: £50,000 Network Security Engineer: £55,000 Cybersecurity Manager: £65,000 Security Consultant: £60,000 Information Security Officer: £58,000 Threat Intelligence Analyst: £53,000 Cybersecurity Architect: £62,000 Certification: Students will be awarded a CPD certificate upon successful completion, recognising their advanced Network Security Level 2 proficiency. FAQ What is Level 3 cyber security? Level 3 cyber security refers to a qualification or course that provides an advanced understanding of cybersecurity principles and practices. It is often designed for individuals with foundational cybersecurity knowledge who want to deepen their expertise. What are the 5 types of network security? The five types of network security are: Firewalls, which prevent unauthorised access to or from a private network; Antivirus and anti-malware software, which protect against malicious software; Intrusion Prevention Systems (IPS), which identify and prevent known threats; Virtual Private Networks (VPNs) which provide secure remote access; and Data Loss Prevention (DLP) prevents sensitive data from leaving the network. What is BTEC Level 2 cyber security? BTEC Level 2 cyber security is a qualification that provides an introduction to the principles and practices of cybersecurity. It is typically designed for individuals new to the field and seeking foundational knowledge. What is OCN NI Level 2 cybersecurity? OCN NI Level 2 cybersecurity is a qualification offered by the Open College Network Northern Ireland. It provides a foundational understanding of cybersecurity principles and practices and is designed for individuals new to the field. What is OCN Level 2 equivalent to? OCN Level 2 is equivalent to a GCSE grade A*-C or a Level 2 NVQ. An intermediate-level qualification provides a foundation in a specific subject area. What is OCN Level 2 qualification? OCN Level 2 qualification is an intermediate-level qualification that provides a foundational understanding of a specific subject area. It is typically designed for individuals who have completed basic education and seek to further their knowledge and skills. Course Curriculum 2 sections • 9 lectures • 02:12:00 total length •Security and Risk Management: 00:24:00 •Asset Security: 00:12:00 •Security Engineering: 00:15:00 •Communication and Network Security: 00:10:00 •Identity and Access Management: 00:10:00 •Security Assessment and Testing: 00:12:00 •Security Operations: 00:36:00 •Software Development Security: 00:13:00 •Assignment - Network Security Level 2: 00:00:00
Private Investigation Process and Classification of Crime is a comprehensive course that explores the exciting world of private investigation. A private detective is a professional who is hired to perform investigations on behalf of individuals, law firms, corporations, or government agencies. This course provides learners with an in-depth understanding of the process and classification of crime and the skills and knowledge required to succeed in the industry. Learning outcomes : Understand the private investigation process and the classification of crimes Develop skills in crime scene investigation, evidence collection, and suspect surveillance Learn methods of identification and sources of information, including fingerprint verification and handwriting examination Gain knowledge of interview and interrogation techniques, and basic operations of firearms Develop the ability to locate missing people and prepare case reports Understand the code of ethics and learn how to operate a private investigation business The Private Investigation Process and Classification of Crime course provide a comprehensive overview of the private investigation industry. Covering everything from starting an investigation to preparing a case report, this course is ideal for those looking to gain a comprehensive understanding of the industry. Over the course of 19 modules, you'll learn about the different types of crime and how they are classified, as well as how to conduct a thorough investigation. You'll develop skills in crime scene investigation and photography, evidence collection, and surveillance techniques. You'll also learn methods of identification, including fingerprint verification and handwriting examination, as well as the basic operations of firearms. The course also covers how to locate missing people and how to prepare a case report. You'll gain an understanding of the code of ethics that governs the industry, and you'll learn how to operate a private investigation business. By the end of the course, you'll have the knowledge and skills you need to pursue a career in private investigation. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is ideal for the following: Individuals interested in the private investigation industry Law enforcement officers looking to expand their skillset Those seeking to start a private investigation business Students studying criminology or criminal justice Professionals interested in enhancing their understanding of the investigation process Career path Some of the career paths related to this field are: Private Detective (£18,000 - £50,000 per annum) Criminal Investigator (£22,000 - £60,000 per annum) Fraud Investigator (£22,000 - £60,000 per annum) Surveillance Operative (£20,000 - £40,000 per annum) Loss Prevention Officer (£18,000 - £30,000 per annum) Forensic Investigator (£20,000 - £60,000 per annum)
Overview This comprehensive course on Complete Adobe After Effects CC Diploma will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Complete Adobe After Effects CC Diploma comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Complete Adobe After Effects CC Diploma. It is available to all students, of all academic backgrounds. Requirements Our Complete Adobe After Effects CC Diploma is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 20 sections • 81 lectures • 09:59:00 total length •1.1 Intro Video 00:03:00 •1.3 Animate Your Name 00:07:00 •2.1 Understand the After Effects Workspace: 00:06:00 •2.2 Starting a New Composition: 00:08:00 •2.3 Adding Media to Your Project and Timeline: 00:05:00 •2.4 Using the Basic After Effects Tools: 00:10:00 •2.5 Create a Perfect Circle, Alignment, and Shape Colors: 00:03:00 •2.6 Working in the Timeline: 00:11:00 •2.7 Layer Properties: 00:09:00 •3.1 Animating in After Effects: 00:08:00 •3.2 Position, Scale, and Rotation Animations: 00:05:00 •3.3 Tips to Make Your Animations Look More Nautral: 00:04:00 •3.4 Using the Graph Editor: 00:06:00 •3.5 Challenge - Bouncing Ball: 00:01:00 •3.6 Solution - Bouncing Ball: 00:20:00 •4.1 Working With Solid Layers and the ken Burns Effects: 00:07:00 •4.2 Working With Shape Layers, Strokes, and Paths: 00:06:00 •4.3 Adding Layer Styles Like Drop Shadow, Bevel, and Gradients: 00:04:00 •4.4 Shape Effects - Trim Path Animation, Wiggle, and Zig Zag: 00:06:00 •5.1 Track Matte Animation - Make Layers Appear And Disappear: 00:09:00 •5.2 Using Pre-Compositions to Group Layers: 00:06:00 •5.3 Easily Reverse Complicated Animations: 00:02:00 •5.4 Playing with Time: 00:06:00 •5.5 Blend Modes: 00:06:00 •5.6 Stabilize Shaky Footage: 00:04:00 •6.1 Intro to Motion Graphics Projects: 00:01:00 •6.2 Clean Lower Third: 00:09:00 •6.3 Logo Reveal Animation Bumper: 00:13:00 •6.4 Colorful Transition: 00:17:00 •6.5 Text with Mask Path Animation: 00:10:00 •6.6 Text Bubble Animation: 00:14:00 •6.7 Weather App 1: 00:17:00 •6.8 Weather App 2: 00:08:00 •6.9 Weather App 3: 00:07:00 •7.1 Flat Animation Challenge: 00:03:00 •7.2 Phil Designs his Flat Animation Scene: 00:13:00 •7.3 Animating Fireworks with the Repeater Effect: 00:15:00 •8.1 Removing Green Screen Background: 00:07:00 •8.2 Adding a Background that Matches the Foreground: 00:08:00 •8.3 Adding Motion to a Still Image with the Puppet Tool: 00:06:00 •8.4 Adding Movement with the Ripple Effect: 00:06:00 •9.1 Intro to 3D: 00:10:00 •9.2 Swinging 3D Text Animation: 00:12:00 •9.3 Build Out Your 3D Composition: 00:06:00 •9.4 Animating Our 3D Scene: 00:08:00 •9.5 Create Stars in After Effects: 00:05:00 •10.1 Using the Rotoscope Tool: 00:07:00 •10.2 Cleaning Up Your Edges: 00:07:00 •10.3 Finishing Our Rotobrush Animation: 00:08:00 •11.1 Easy Screen Replacement with Masks: 00:10:00 •11.2 Replacing a Screen Version 2: 00:14:00 •11.3 Screen Replacement with Mocha: 00:08:00 •12.1 Using the Puppet Pin Tool: 00:05:00 •12.2 Animating Your Puppet Pins: 00:03:00 •12.3 Animated Blinking Eyes: 00:08:00 •12.4 Adding Perspective with Animated Clouds: 00:07:00 •13.1 Applying Text Animation Presets: 00:06:00 •13.2 Create a page Turn Effect with CC page Turn: 00:10:00 •13.3 Radial and Linear wipes: 00:03:00 •13.4 Color Correction in After Effects: 00:04:00 •14.1 Motion Tracking Basics: 00:10:00 •14.2 Tracking Text and Visual Effects to Video Clip: 00:06:00 •14.3 Tracking Rotation and Scale: 00:12:00 •14.4 Adding Details to Our Text: 00:04:00 •15.1 Intro to Character Animation: 00:02:00 •15.2 Design Your Character: 00:15:00 •15.3 Rigging Your Character: 00:03:00 •15.4 animation Our Character: 00:10:00 •15.5 Adding the Animated Background: 00:09:00 •15.6 Adding Details to Character Movement: 00:07:00 •15.7 Adding the Paper Cut Out Look: 00:06:00 •16.1 Exporting an H264 File From After Effects: 00:07:00 •16.2 Exporting from After Effects with a Transparent Background: 00:04:00 •16.3 Exporting from After Effects through Adobe Media Encoder: 00:05:00 •16.4 Create an Animated GIF from After Effects: 00:07:00 •17.1 Audio Tips for After Effects: 00:03:00 •17.2 Working with Premiere Pro: 00:06:00 •18.1 Expressions Basics: 00:07:00 •18.2 Animate a Flickering with Expressions: 00:18:00 •19.1 Conclusion: 00:01:00 •Resources - Diploma in Adobe After Effects CC 2017: 00:00:00
Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis. With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00
Overview This comprehensive course on VMware vSphere Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This VMware vSphere Course comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this VMware vSphere Course. It is available to all students, of all academic backgrounds. Requirements Our VMware vSphere Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 109 lectures • 08:15:00 total length •Who's the Intended Audience?: 00:02:00 •Getting VMware Certified: 00:05:00 •What is Virtual Machine and Hypervisor?: 00:04:00 •vSphere Licensing Editions: 00:04:00 •What's the New in VMware vSphere7: 00:03:00 •vCenter and the Role: 00:03:00 •VMware Hands on Lab: 00:06:00 •What This Module Covers: 00:01:00 •Virtualization System Requirements: 00:04:00 •What do we need to start the course?: 00:05:00 •Download VMware workstation: 00:01:00 •Install VMware workstation: 00:02:00 •Download ESXi and vCenter server: 00:04:00 •Download ESXi and vCenter server: 00:04:00 •How to boot a VM from in VMware Workstation: 00:07:00 •Configure ESX Part 1: 00:09:00 •Configure ESX Part 2: 00:05:00 •ESXi by a Browser: 00:03:00 •ESXi Settings: 00:05:00 •Create a Datastore in ESXi: 00:04:00 •Upload a Windows ISO file to ESXi: 00:01:00 •Install a Virtual Machine in ESXi: 00:07:00 •Connect to an ESXi by VMware Workstation: 00:02:00 •What This Module Covers: 00:01:00 •Why Do We Need Active Directory: 00:01:00 •Prepare Active Directory Windows 2019: 00:06:00 •Create Virtual Machine Template for VMware Workstation: 00:06:00 •Install Active Directory Role: 00:05:00 •Creating DNS Record for vCenter: 00:02:00 •Deploy and install vCenter Appliance: 00:12:00 •Adding ESXis to VC: 00:03:00 •AUTO start VM: 00:02:00 •Verify AUTO Start VM: 00:03:00 •Take Snapshot from vSphere Lab: 00:03:00 •Enable SSH on ESX: 00:02:00 •ESXi DCUI Console: 00:01:00 •vCSA's Management Ul: 00:06:00 •Install ftp Server Using FileZilla Server: 00:05:00 •Backing up VCSA with ftp Server: 00:06:00 •Restore VCSA: 00:09:00 •Exploring vCSA with vSphere Client: 00:07:00 •Overview of VM Tools: 00:02:00 •Install VM Tools: 00:04:00 •Virtual Machine Files: 00:02:00 •Virtual Machine Power off: 00:04:00 •OVA and OVF Files: 00:03:00 •Demo OVF (Importing and Exporting): 00:04:00 •What This Module Covers: 00:01:00 •Virtual Switch (vSwitch) Overview: 00:03:00 •Standard vSwitches: 00:02:00 •Distributed vSwitches: 00:02:00 •Adding Network Adapter: 00:03:00 •vSwitch Creation and Configuration: 00:07:00 •Assign New Switch to the Virtual Machine: 00:02:00 •Verify New vSwitch Configuration: 00:06:00 •Adding VMkernel for Management and Vmotion Traffic: 00:03:00 •Create a vSphere Distributed Switch: 00:10:00 •What This Module Covers: 00:01:00 •Overview of Using ESXi with a SAN: 00:02:00 •Types of Storage: 00:03:00 •What Is Software-Defined Storage (SEIS): 00:04:00 •What is File Level Storage and Block Level Storage?: 00:03:00 •What is an iScsi Storage?: 00:08:00 •Adding vSwitch for iScsi Target: 00:05:00 •Adding Disk to Active Directory: 00:02:00 •Enable iScsi Target on Windows Server: 00:05:00 •Adding iSsci Disk as ESXi Datastore: 00:08:00 •Expand and Extend Datastore: 00:09:00 •Enable NFS on Windows Server: 00:05:00 •Creating an NFS Datastore: 00:03:00 •Migrate a VM to NFS Share: 00:04:00 •VM Add to Inventory: 00:02:00 •What This Module Covers: 00:01:00 •Update Sequence: 00:03:00 •vCenter 6.7 Upgrade to vCenter 7: 00:08:00 •Upgrade ESXi 6.7 ESXi 7: 00:04:00 •Upgrade ESXi 6.7 ESXi 7 using Bundle File: 00:07:00 •Introduction to vSphere 7 Lifecycle Management: 00:03:00 •Demo vSphere 7 Lifecycle Management: 00:17:00 •What This Module Covers: 00:01:00 •vCenter 7 MultiMorning: 00:02:00 •Demo Configure vCenter J MultiMorning: 00:04:00 •vCenter 7 PNID and FQDN Changes: 00:10:00 •vCenter Server Profiles: 00:04:00 •vSphere 7 Licensing: 00:03:00 •What the Module Covers: 00:01:00 •Manual Backup and restore from a VM: 00:06:00 •Backup a VM using Filezilla: 00:05:00 •Backup a VM using OVF Files: 00:06:00 •Clone and Snapshot: 00:08:00 •Installing Veeam Backup and Replication: 00:05:00 •Backup and Restore Using Veeam Backup Software: 00:09:00 •Upload VM from Workstation to ESXi: 00:04:00 •What This Module Covers: 00:01:00 •User Identity: 00:04:00 •Users and Poles: 00:11:00 •Define a New Role in vSphere: 00:04:00 •Account Policy and Message: 00:03:00 •Firewall and Service: 00:11:00 •Enable Lockdown Mode: 00:09:00 •What This Module Covers: 00:01:00 •Troubleshooting using ESXi Management Agents: 00:05:00 •Working with vCenter 7 Logs: 00:04:00 •ESXi Shell Power on and off Commands: 00:05:00 •What This Module Covers: 00:01:00 •Monitoring Virtual Machines in vSphere 7: 00:15:00 •Introduction to ESXTOP Command in ESXi: 00:03:00 •Using ESXTOP to Monitor an ESXi 6.0 Host: 00:07:00 •Monitor Vsphere with Veeam ONE: 00:07:00
Overview Having a foundational understanding of IT components is essential. Did you know that by 2023, an estimated 2.5 million new IT positions will be available globally? The CompTIA A+ (220-1001) course offers a comprehensive dive into the world of computer technology. Designed to shape the professionals of tomorrow, this course meticulously covers the gamut of fundamental IT knowledge. Ranging from RAM technology to the vast world of cloud computing, the curriculum is structured to foster a comprehensive understanding. With modules such as 'Inside the PC' and 'Understanding Virtualization', learners will be adept at navigating the complex terrains of the modern IT environment. Ready to steer your career into the future of IT? Enrol now and become a part of the technological revolution! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1001). It is available to all students, of all academic backgrounds. Requirements Our CompTIA A+ (220-1001) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 24 sections • 132 lectures • 17:30:00 total length •CompTIA A+ 2019 Core 1 (220-1001) Course Introduction: 00:02:00 •What is the CompTIA A+?: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 1 (220-1001) Exam?: 00:09:00 •How to Pass the A+ Exam: 00:04:00 •How to Use This Video Course: 00:03:00 •Tools of the Trade: 00:06:00 •Troubleshooting Theory: 00:10:00 •Primary PC Connections: 00:05:00 •External Connections: 00:11:00 •Inside the PC: 00:08:00 •What is a Computer?: 00:07:00 •What is a CPU?: 00:15:00 •CPU Speeds and Cores: 00:12:00 •Caching: 00:07:00 •CPU Sockets: 00:12:00 •Installing a CPU: 00:11:00 •Liquid Cooling: 00:04:00 •RAM Technology: 00:11:00 •RAM Capacity: 00:08:00 •RAM Features: 00:07:00 •Installing RAM: 00:07:00 •What is the BIOS?: 00:06:00 •POST: 00:09:00 •System Setup: 00:09:00 •Troubleshooting Firmware: 00:12:00 •Form Factors: 00:06:00 •Chipsets: 00:05:00 •Touring the Motherboard: 00:14:00 •Touring the Case: 00:07:00 •Installing a Motherboard: 00:09:00 •The Power Supply: 00:09:00 •Mounting a Power Supply: 00:05:00 •Choosing a Power Supply: 00:08:00 •Cooling Your PC: 00:11:00 •Troubleshooting Power Supplies: 00:09:00 •Troubleshooting Core Components: 00:14:00 •Introduction to Mass Storage: 00:13:00 •Magnetic Disk Drives: 00:08:00 •Solid State Drives: 00:08:00 •SCSI: 00:03:00 •Boot Order: 00:07:00 •New Installation - First Drive: 00:05:00 •RAID: 00:11:00 •Hardware RAID: 00:07:00 •Mass Storage Troubleshooting: 00:08:00 •Optical Media: 00:10:00 •USB Standards: 00:10:00 •Understanding USB: 00:11:00 •Configuring USB: 00:07:00 •Thunder and Lightning: 00:06:00 •Keyboards and Mice: 00:08:00 •Sight and Sound: 00:07:00 •Readers and Scanners: 00:08:00 •Using Expansion Cards: 00:08:00 •The Right PC for the Job: 00:13:00 •Monitor Technologies: 00:08:00 •LCD Breakdown: 00:04:00 •Graphics Cards and Connections: 00:13:00 •Installing a Graphics Card: 00:07:00 •Projectors: 00:05:00 •Troubleshooting Monitors: 00:06:00 •Introduction to Networking: 00:08:00 •Hubs vs. Switches: 00:05:00 •Hexadecimal: 00:07:00 •WANs and Routers: 00:09:00 •Cables and Connectors: 00:11:00 •Crimping Cables: 00:10:00 •Structured Cabling: 00:11:00 •Introduction to TCP/IP: 00:14:00 •Network IDs and Subnet Masks: 00:05:00 •Special IP Addresses: 00:09:00 •NAT: 00:07:00 •Dynamic IP Addressing: 00:10:00 •IPv6: 00:07:00 •Port Numbers: 00:12:00 •TCP, UDP, and ICMP: 00:06:00 •Understanding DNS: 00:09:00 •Working with DNS: 00:07:00 •Windows Naming: 00:08:00 •Routers: 00:12:00 •Basic Router Configuration: 00:12:00 •Advanced Router Configuration: 00:06:00 •VLANs: 00:07:00 •Network Troubleshooting: 00:05:00 •Wireless Network Hardware: 00:11:00 •Wi-Fi Standards: 00:10:00 •Basic WAP Setup: 00:11:00 •Connecting to a Wi-Fi Network: 00:09:00 •It's a Huge Mesh: 00:04:00 •Beyond Wi-Fi: 00:07:00 •Troubleshooting Wireless Connections: 00:07:00 •Beyond the LAN: 00:03:00 •Internet Tiers: 00:06:00 •Dial-up Connections: 00:08:00 •Broadband Connections: 00:10:00 •Firewalls and Servers: 00:06:00 •FTP: 00:07:00 •E-Mail: 00:08:00 •Proxy Servers: 00:06:00 •Virtual Private Networks (VPNs): 00:08:00 •Internet of Things (IoT): 00:04:00 •Understanding Virtualization: 00:10:00 •Your First Virtual Machine: 00:11:00 •Advanced Virtualization Setup: 00:10:00 •Cloud Computing: 00:08:00 •Cloud Ownership: 00:03:00 •Cloud-Based Applications: 00:06:00 •Laptop Features: 00:08:00 •Laptop Hardware Troubleshooting - The Tools: 00:05:00 •Laptop Hardware - Core Hardware: 00:04:00 •Laptop Hardware - CPU and Motherboard: 00:07:00 •Touring Your Laptop Display: 00:04:00 •What is a Mobile Device?: 00:09:00 •Mobile Connections: 00:10:00 •Touring Android: 00:10:00 •Touring iOS: 00:08:00 •Virtual Reality: 00:03:00 •Maintaining Mobile Devices: 00:11:00 •Mobile Devices and E-mail: 00:10:00 •Mobile Synchronization: 00:08:00 •Laser Printers: 00:13:00 •Inkjet Printers: 00:08:00 •Impact Printers: 00:04:00 •Thermal Printers: 00:04:00 •Installing a Local Printer: 00:14:00 •Sharing Printers: 00:08:00 •Installing Wireless and Cloud Printers: 00:10:00 •Troubleshooting Printers: 00:10:00 •3D Printing: 00:07:00 •Dealing with Threats: 00:07:00 •Assignment - CompTIA A+ (220-1001): 00:00:00
Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00
In a world where our lives are increasingly online, network security is more important than ever. This Computer Network Security from Scratch to Advanced course will teach you everything you need to know about computer network security, from the basics of how networks work to the most advanced security technologies. In this course, you will learn about the ISO/OSI model and TCP/IP protocols, gaining a solid foundation in understanding how data is transmitted across networks. You will then explore wireless networks, learning about their vulnerabilities and how to secure them effectively. Our expert instructors will guide you through the complex world of network security, covering essential concepts such as firewalls, intrusion detection and prevention systems, and incident handling. Overall, You will develop practical skills in securing computer networks. By the end of this course, you will have the confidence and knowledge to safeguard networks against potential threats. This will make you an invaluable asset to any organisation. So don't miss out on this opportunity to enhance your coding prowess and become a master in computer network security. Enrol today and unlock a world of exciting possibilities! Learning Outcomes: Upon successful completion of the Computer Network Security course, you will be able to: Understand the fundamentals of computer networks and their components. Gain in-depth knowledge of the ISO/OSI model and TCP/IP protocols. Identify and mitigate security vulnerabilities in wireless networks. Implement effective network security measures, including firewalls and honeypots. Utilise intrusion detection and prevention systems to safeguard networks. Develop expertise in securing wireless networks against unauthorised access. Acquire skills in physical security and incident handling for network protection. Apply comprehensive network security strategies to ensure data integrity and confidentiality. Who is this course for? This Computer Network Security course is ideal for: IT professionals seeking to enhance their knowledge of network security. Students pursuing a career in cybersecurity or network administration. Software developers interested in understanding the intricacies of computer networks. Network engineers aiming to specialise in network security. Individuals responsible for maintaining the security of organisational networks. Career Path Our Computer Network Security course will prepare you for a range of careers, including: Network Security Analyst: £35,000 - £60,000 per year. Cybersecurity Specialist: £45,000 - £80,000 per year. Network Administrator: £30,000 - £50,000 per year. IT Security Consultant: £40,000 - £80,000 per year. Information Security Manager: £50,000 - £100,000 per year. Network Security Engineer: £40,000 - £70,000 per year. Certification After studying the course materials of the Computer Networks Security from Scratch to Advanced there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Prerequisites This Computer Networks Security from Scratch to Advanced does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Computer Networks Security from Scratch to Advanced was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Course Curriculum Introduction Introduction 00:10:00 Section 01: An Introduction to Computer Networks 1.1 Computer Network 00:11:00 1.2 Computer Network Topologies 00:11:00 1.3 Categories of Computer Network 00:10:00 1.4 Computer Network Devices 00:11:00 1.5 Transmission Media 00:09:00 Section 02: ISO/OSI Model 2.1 ISO/OSI Model 00:10:00 2.2 Application, Presentation, and Session Layers 00:12:00 2.3 Transport and Network Layers 00:11:00 2.4 Data Link and Physical Layers 00:09:00 2.5 ISO/OSI Model in Action 00:10:00 Section 03: TCP/IP Protocols 3.1 Introduction to Computer Networks Protocols 00:11:00 3.2 IP Protocol 00:13:00 3.3 TCP and UDP Protocols 00:12:00 3.4 Application Protocols 00:12:00 3.5 TCP/IP Characteristics and Tools 00:11:00 Section 04: Wireless Networks 4.1 Wireless Networks Benefits 00:09:00 4.2 Types of Wireless Networks 00:12:00 4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00 4.4 Wireless Networks Devices 00:10:00 4.5 Wireless Networks Drawbacks 00:09:00 Section 05: Network Security 5.1 Security Goals 00:09:00 5.2 Securing the Network Design 00:10:00 5.3 TCP/IP Security and Tools 00:12:00 5.4 Port Scanning and Tools 00:11:00 5.5 Sniffing and Tools 00:10:00 Section 06: Firewalls and Honeypots 6.1 Reasons to Use Firewall 00:13:00 6.2 Firewalls Rules 00:11:00 6.3 Firewalls Filtering 00:09:00 6.4 Honeypots 00:07:00 6.5 Bypassing Firewalls 00:08:00 Section 07: Intrusion Detection and Prevention System 7.1 Intrusion Detection System: IDS 00:11:00 7.2 Network IDS: NIDS 00:06:00 7.3 NIDS Challenges 00:09:00 7.4 Snort as NIDS 00:08:00 7.5 Intrusion Prevention Systems: IPS 00:07:00 Section 08: Wireless Network Security 8.1 Wired Equivalent Privacy WEP Attacking 00:11:00 8.2 WPA and AES Protocols 00:09:00 8.3 Wireless Security Misconceptions 00:09:00 8.4 Wireless Attacks and Mitigation 00:09:00 8.5 Secure Network Design with Wireless 00:09:00 Section 09: Physical Security and Incident Handling 9.1 Physical Security Objectives 00:11:00 9.2 Physical Threats and Mitigation 00:11:00 9.3 Defense in Depth (DiD) 00:07:00 9.4 Incident 00:06:00 9.5 Incident Handling 00:14:00 Section 10: Network Security: Conclusion 10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00 10.2 Assets, Threats, and Vulnerabilities 00:04:00 10.3 Risks and Network Intrusion 00:06:00 10.4 Common Attacks 00:09:00 10.5 Security Recommendations 00:06:00 Assignment Assignment - Computer Networks Security from Scratch to Advanced 00:00:00