• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

355 Firewall courses delivered Online

CompTIA Network+ Certification (N10-007)

4.7(26)

By Academy for Health and Fitness

** Trust The 35000+ Students Who Are Learning with Us & Kick Starting Their Career! ** Deal Price is Active; Save Now- £405! Offer Ends Soon; Hurry Up!! Are you looking to improve your current abilities or make a career move? Our unique CompTIA Network+ Certification (N10-007) Course might help you get there! Expand your expertise with high-quality training - study and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. This online training course is accredited by CPD with 20 CPD points for professional development. Students can expect to complete this training course in around 23 hours. You'll also get dedicated expert assistance from us to answer any queries you may have while studying our course. The course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the course, you will receive an instant e-certificate as proof of comprehensive skill development and competency. Add these amazing new skills to your resume and boost your employability by simply enrolling on this course. With this comprehensive course, you can achieve your dreams and train for your ideal career. The course provides students with an in-depth learning experience that they can work through at their own pace to enhance their professional development. You'll get a Free Student ID card by enrolling in this course. This ID card entitles you to discounts on bus tickets, movie tickets, and library cards. Enrolling on the course will ensure that you land your dream career faster than you thought possible. Stand out from the crowd and train for the job you want with the program. Experts created the CompTIA Network+ Certification (N10-007) course to provide a rich and in-depth training experience for all students who enrol in it. Enrol in the course right now and you'll have immediate access to all of the course materials. Then, from any internet-enabled device, access the course materials and learn when it's convenient for you. Start your learning journey straight away with this course and take a step toward a brighter future! Why Prefer this CompTIA Network+ Certification (N10-007) Course? Opportunity to earn a certificate accredited by CPD after completing this course Student ID card with amazing discounts - completely for FREE! (£10 postal charges will be applicable for international delivery) Standards-aligned lesson planning Innovative and engaging content and activities Assessments that measure higher-level thinking and skills Complete the program in your own time, at your own pace Each of our students gets full 24/7 tutor support *** Course Curriculum *** Here is the curriculum breakdown of course: Section 01: Introduction Introduction Section 02: Network Models What is a Model? OSI vs. TCP/IP Model Walking Through OSI and TCP/IP Meet the Frame The MAC Address Broadcast vs. Unicast Introduction to IP Addressing Packets and Ports Section 03: Cabling and Topology Network Topologies Coaxial Cabling Twisted Pair Cabling Cat Ratings Fiber Optic Cabling Fire Ratings Legacy Network Connections Section 04: Ethernet Basics What is Ethernet? Ethernet Frames Early Ethernet The Daddy of Ethernet, 10BaseT Terminating Twisted Pair Hubs vs. Switches Section 05: Modern Ethernet 100BaseT Connecting Switches Gigabit Ethernet and 10-Gigabit Ethernet Transceivers Connecting Ethernet Scenarios Section 06: Installing a Physical Network Introduction to Structured Cabling Terminating Structured Cabling Equipment Room Alternative Distribution Panels Testing Cable Troubleshooting Structured Cabling, Part 1 Troubleshooting Structured Cabling, Part 2 Using a Toner and Probe Wired Connection Scenarios Section 07: TCP/IP Basics Introduction to IP Addressing and Binary Introduction to ARP Classful Addressing Subnet Masks Subnetting with CIDR More CIDR Subnetting Practice Dynamic and Static IP Addressing Rogue DHCP Servers Special IP Addresses IP Addressing Scenarios Section 08: Routing Introducing Routers Understanding Ports Network Address Translation Implementing NAT Forwarding Ports Tour of a SOHO Router SOHO vs. Enterprise Static Routes Dynamic Routing RIP OSPF BGP Section 09: TCP/IP Applications TCP and UDP ICMP and IGMP Handy Tools Introduction to Wireshark Introduction to netstat Web Servers FTP E-mail Servers and Clients Securing E-mail Telnet and SSH Network Time Protocol Network Service Scenarios Section 10: Network Naming Understanding DNS Applying DNS The Hosts File Net Command Windows Name Resolution Dynamic DNS DNS Troubleshooting Section 11: Securing TCP/IP Making TCP/IP Secure Symmetric Encryption Asymmetric Encryption Cryptographic Hashes Identification Access Control AAA Kerberos/EAP Single Sign-On Certificates and Trust Certificate Error Scenarios Section 12: Advanced Networking Devices Understanding IP Tunneling Virtual Private Networks Introduction to VLANs InterVLAN Routing Interfacing with Managed Switches Switch Port Protection Port Bonding Port Mirroring Quality of Service IDS vs. IPS Proxy Servers Load Balancing Device Placement Scenarios Section 13: IPv6 Introduction to IPv6 IPv6 Addressing IPv6 in Action IPv4 and IPv6 Tunneling Section 14: Remote Connectivity Telephony Technologies Optical Carriers Packet Switching Connecting with Dial-up Digital Subscriber Line (DSL) Connecting with Cable Modems Connecting with Satellites ISDN and BPL Remote Desktop Connectivity Advanced Remote Control Systems Section 15: Wireless Networking Introduction to 802.11 802.11 Standards Power over Ethernet (PoE) Antennas Wireless Security Standards Implementing Wireless Security Threats to Your Wireless Network Retro Threats Wi-Fi Protected Setup (WPS) Enterprise Wireless Installing a Wireless Network Wireless Scenarios More Wireless Scenarios Section 16: Virtualization and Cloud Computing Virtualization Basics Cloud Ownership Cloud Implementation Your First Virtual Machine NAS and SAN Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Section 17: Mobile Networking Cellular Technologies Mobile Connectivity Deploying Mobile Devices Mobile Access Control Section 18: Building a Real-World Network Network Types Network Design Power Management Unified Communications Network Documentation Contingency Planning Predicting Hardware Failure Backups Section 19: Managing Risk What is Risk Management? Security Policies Change Management1 User Training Standard Business Documentation Mitigating Network Threats High Availability Section 20: Protecting Your Network Denial of Service Malware Social Engineering Access Control Man-in-the-Middle Introduction to Firewalls Firewalls DMZ Hardening Devices Physical Security Controls Testing Network Security Network Protection Scenarios Section 21: Network Monitoring SNMP Documenting Logs System Monitoring SIEM (Security Information and Event Management) Section 22: Network Troubleshooting Network Troubleshooting Theory Assessment Process Once you have completed all the modules in the CompTIA Network+ Certification (N10-007) course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. Show off Your New Skills with a Certificate of Completion The learners have to complete the assessment of this course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39. CPD 20 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This CompTIA Network+ Certification (N10-007) Course Right for You? Anyone interested in learning more about this subject should take this course. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. All are welcome to take this course. There are no prerequisites for enrolment, and you can access the course materials from any location in the world. Requirements The CompTIA Network+ Certification (N10-007) program does not require any prior knowledge; everyone may participate! This course is open to anyone interested in learning from anywhere in the world. Every student must be over the age of 16 and have a passion for learning and literacy. This 100% online course can be accessed from any internet-connected device, such as a computer, tablet, or smartphone. This course allows you to study at your speed and grow a quality skillset. Career path After completing this CompTIA Network+ Certification (N10-007) Course, you are to start your career or begin the next phase of your career in this field. Our entire course will help you to gain a position of respect and dignity over your competitors. The certificate enhances your CV and helps you find work in the field concerned.

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand23 hours
£12

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

5.0(10)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

CompTIA A+ (220-1001)

5.0(10)

By Apex Learning

Overview Having a foundational understanding of IT components is essential. Did you know that by 2023, an estimated 2.5 million new IT positions will be available globally? The CompTIA A+ (220-1001) course offers a comprehensive dive into the world of computer technology.  Designed to shape the professionals of tomorrow, this course meticulously covers the gamut of fundamental IT knowledge. Ranging from RAM technology to the vast world of cloud computing, the curriculum is structured to foster a comprehensive understanding. With modules such as 'Inside the PC' and 'Understanding Virtualization', learners will be adept at navigating the complex terrains of the modern IT environment. Ready to steer your career into the future of IT? Enrol now and become a part of the technological revolution! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1001). It is available to all students, of all academic backgrounds. Requirements Our CompTIA A+ (220-1001) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 24 sections • 132 lectures • 17:30:00 total length •CompTIA A+ 2019 Core 1 (220-1001) Course Introduction: 00:02:00 •What is the CompTIA A+?: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 1 (220-1001) Exam?: 00:09:00 •How to Pass the A+ Exam: 00:04:00 •How to Use This Video Course: 00:03:00 •Tools of the Trade: 00:06:00 •Troubleshooting Theory: 00:10:00 •Primary PC Connections: 00:05:00 •External Connections: 00:11:00 •Inside the PC: 00:08:00 •What is a Computer?: 00:07:00 •What is a CPU?: 00:15:00 •CPU Speeds and Cores: 00:12:00 •Caching: 00:07:00 •CPU Sockets: 00:12:00 •Installing a CPU: 00:11:00 •Liquid Cooling: 00:04:00 •RAM Technology: 00:11:00 •RAM Capacity: 00:08:00 •RAM Features: 00:07:00 •Installing RAM: 00:07:00 •What is the BIOS?: 00:06:00 •POST: 00:09:00 •System Setup: 00:09:00 •Troubleshooting Firmware: 00:12:00 •Form Factors: 00:06:00 •Chipsets: 00:05:00 •Touring the Motherboard: 00:14:00 •Touring the Case: 00:07:00 •Installing a Motherboard: 00:09:00 •The Power Supply: 00:09:00 •Mounting a Power Supply: 00:05:00 •Choosing a Power Supply: 00:08:00 •Cooling Your PC: 00:11:00 •Troubleshooting Power Supplies: 00:09:00 •Troubleshooting Core Components: 00:14:00 •Introduction to Mass Storage: 00:13:00 •Magnetic Disk Drives: 00:08:00 •Solid State Drives: 00:08:00 •SCSI: 00:03:00 •Boot Order: 00:07:00 •New Installation - First Drive: 00:05:00 •RAID: 00:11:00 •Hardware RAID: 00:07:00 •Mass Storage Troubleshooting: 00:08:00 •Optical Media: 00:10:00 •USB Standards: 00:10:00 •Understanding USB: 00:11:00 •Configuring USB: 00:07:00 •Thunder and Lightning: 00:06:00 •Keyboards and Mice: 00:08:00 •Sight and Sound: 00:07:00 •Readers and Scanners: 00:08:00 •Using Expansion Cards: 00:08:00 •The Right PC for the Job: 00:13:00 •Monitor Technologies: 00:08:00 •LCD Breakdown: 00:04:00 •Graphics Cards and Connections: 00:13:00 •Installing a Graphics Card: 00:07:00 •Projectors: 00:05:00 •Troubleshooting Monitors: 00:06:00 •Introduction to Networking: 00:08:00 •Hubs vs. Switches: 00:05:00 •Hexadecimal: 00:07:00 •WANs and Routers: 00:09:00 •Cables and Connectors: 00:11:00 •Crimping Cables: 00:10:00 •Structured Cabling: 00:11:00 •Introduction to TCP/IP: 00:14:00 •Network IDs and Subnet Masks: 00:05:00 •Special IP Addresses: 00:09:00 •NAT: 00:07:00 •Dynamic IP Addressing: 00:10:00 •IPv6: 00:07:00 •Port Numbers: 00:12:00 •TCP, UDP, and ICMP: 00:06:00 •Understanding DNS: 00:09:00 •Working with DNS: 00:07:00 •Windows Naming: 00:08:00 •Routers: 00:12:00 •Basic Router Configuration: 00:12:00 •Advanced Router Configuration: 00:06:00 •VLANs: 00:07:00 •Network Troubleshooting: 00:05:00 •Wireless Network Hardware: 00:11:00 •Wi-Fi Standards: 00:10:00 •Basic WAP Setup: 00:11:00 •Connecting to a Wi-Fi Network: 00:09:00 •It's a Huge Mesh: 00:04:00 •Beyond Wi-Fi: 00:07:00 •Troubleshooting Wireless Connections: 00:07:00 •Beyond the LAN: 00:03:00 •Internet Tiers: 00:06:00 •Dial-up Connections: 00:08:00 •Broadband Connections: 00:10:00 •Firewalls and Servers: 00:06:00 •FTP: 00:07:00 •E-Mail: 00:08:00 •Proxy Servers: 00:06:00 •Virtual Private Networks (VPNs): 00:08:00 •Internet of Things (IoT): 00:04:00 •Understanding Virtualization: 00:10:00 •Your First Virtual Machine: 00:11:00 •Advanced Virtualization Setup: 00:10:00 •Cloud Computing: 00:08:00 •Cloud Ownership: 00:03:00 •Cloud-Based Applications: 00:06:00 •Laptop Features: 00:08:00 •Laptop Hardware Troubleshooting - The Tools: 00:05:00 •Laptop Hardware - Core Hardware: 00:04:00 •Laptop Hardware - CPU and Motherboard: 00:07:00 •Touring Your Laptop Display: 00:04:00 •What is a Mobile Device?: 00:09:00 •Mobile Connections: 00:10:00 •Touring Android: 00:10:00 •Touring iOS: 00:08:00 •Virtual Reality: 00:03:00 •Maintaining Mobile Devices: 00:11:00 •Mobile Devices and E-mail: 00:10:00 •Mobile Synchronization: 00:08:00 •Laser Printers: 00:13:00 •Inkjet Printers: 00:08:00 •Impact Printers: 00:04:00 •Thermal Printers: 00:04:00 •Installing a Local Printer: 00:14:00 •Sharing Printers: 00:08:00 •Installing Wireless and Cloud Printers: 00:10:00 •Troubleshooting Printers: 00:10:00 •3D Printing: 00:07:00 •Dealing with Threats: 00:07:00 •Assignment - CompTIA A+ (220-1001): 00:00:00

CompTIA A+ (220-1001)
Delivered Online On Demand17 hours 30 minutes
£12

CompTIA Security+ (SY0-601)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

CompTIA Network+ Certification (N10-007)

4.5(3)

By Studyhub UK

Embark on a transformative journey through the intricate landscape of networking with the CompTIA Network+ Certification (N10-007). This course isn't just about mastering the intricacies of network models or delving into the depths of cabling and topology; it's about empowering yourself with the skills and knowledge to navigate the digital highways of the modern era confidently. Picture yourself as the architect, laying down the foundations of robust networks, securing them against digital threats, and troubleshooting with finesse. With CompTIA Network+ +, you're not just learning; you're shaping your future in information technology. In this comprehensive course, you'll traverse through 22 meticulously crafted sections, each unlocking a new facet of comptia networking. From understanding the fundamentals of TCP/IP to exploring the nuances of wireless networking and delving into virtualization and cloud computing, every lesson is a stepping stone towards network mastery. Through immersive learning experiences and hands-on comptia network+ practice tests, you'll absorb theoretical knowledge and hone your practical skills, preparing you for real-world challenges. Learning Outcomes: Master network models and topologies, laying a strong foundation for network architecture. Demonstrate proficiency in TCP/IP fundamentals and routing protocols for effective data transmission. Develop expertise in securing networks against cyber threats, ensuring data integrity and confidentiality. Acquire skills in network troubleshooting and monitoring, enabling swift resolution of issues. Apply wireless networking and cloud computing knowledge to design and implement scalable network solutions. Why buy this CompTIA Network+ Certification (N10-007)? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the CompTIA Network+ Certification (N10-007) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this CompTIA Network+ Certification (N10-007) for? Aspiring IT professionals seeking to kickstart their careers in networking. Students aiming to enhance their employability with industry-recognized certifications. Career changers looking to transition into the dynamic field of information technology. IT professionals seeking to validate their skills and advance their careers. Anyone passionate about mastering the intricacies of comptia network and carving a niche in the digital landscape. Prerequisites This CompTIA Network+ Certification (N10-007) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network+ Certification (N10-007) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Network Administrator: £20,000 - £45,000 Per Annum Network Engineer: £25,000 - £55,000 Per Annum Systems Administrator: £22,000 - £50,000 Per Annum IT Support Technician: £18,000 - £35,000 Per Annum Cyber Security Analyst: £25,000 - £60,000 Per Annum Cloud Solutions Architect: £30,000 - £80,000 Per Annum Course Curriculum Section 01: Introduction Introduction 00:03:00 Section 02: Network Models What is a Model? 00:02:00 OSI vs. TCP/IP Model 00:07:00 Walking Through OSI and TCP/IP 00:12:00 Meet the Frame 00:06:00 The MAC Address 00:07:00 Broadcast vs. Unicast 00:04:00 Introduction to IP Addressing 00:08:00 Packets and Ports 00:05:00 Section 03: Cabling and Topology Network Topologies 00:10:00 Coaxial Cabling 00:05:00 Twisted Pair Cabling 00:06:00 Cat Ratings 00:06:00 Fiber Optic Cabling 00:09:00 Fire Ratings 00:05:00 Legacy Network Connections 00:07:00 Section 04: Ethernet Basics What is Ethernet? 00:07:00 Ethernet Frames 00:07:00 Early Ethernet 00:08:00 The Daddy of Ethernet, 10BaseT 00:03:00 Terminating Twisted Pair 00:14:00 Hubs vs. Switches 00:13:00 Section 05: Modern Ethernet 100BaseT 00:05:00 Connecting Switches 00:05:00 Gigabit Ethernet and 10-Gigabit Ethernet 00:05:00 Transceivers 00:07:00 Connecting Ethernet Scenarios 00:14:00 Section 06: Installing a Physical Network Introduction to Structured Cabling 00:04:00 Terminating Structured Cabling 00:08:00 Equipment Room 00:07:00 Alternative Distribution Panels 00:04:00 Testing Cable 00:09:00 Troubleshooting Structured Cabling, Part 1 00:05:00 Troubleshooting Structured Cabling, Part 2 00:05:00 Using a Toner and Probe 00:03:00 Wired Connection Scenarios 00:11:00 Section 07: TCP/IP Basics Introduction to IP Addressing and Binary 00:13:00 Introduction to ARP 00:04:00 Classful Addressing 00:10:00 Subnet Masks 00:12:00 Subnetting with CIDR 00:10:00 More CIDR Subnetting Practice 00:10:00 Dynamic and Static IP Addressing 00:18:00 Rogue DHCP Servers 00:07:00 Special IP Addresses 00:07:00 IP Addressing Scenarios 00:15:00 Section 08: Routing Introducing Routers 00:15:00 Understanding Ports 00:05:00 Network Address Translation 00:06:00 Implementing NAT 00:03:00 Forwarding Ports 00:18:00 Tour of a SOHO Router 00:12:00 SOHO vs. Enterprise 00:09:00 Static Routes 00:13:00 Dynamic Routing 00:11:00 RIP 00:04:00 OSPF 00:04:00 BGP 00:06:00 Section 09: TCP/IP Applications TCP and UDP 00:07:00 ICMP and IGMP 00:06:00 Handy Tools 00:07:00 Introduction to Wireshark 00:11:00 Introduction to netstat 00:09:00 Web Servers 00:12:00 FTP 00:12:00 E-mail Servers and Clients 00:09:00 Securing E-mail 00:06:00 Telnet and SSH 00:09:00 Network Time Protocol 00:02:00 Network Service Scenarios 00:10:00 Section 10: Network Naming Understanding DNS 00:12:00 Applying DNS 00:19:00 The Hosts File 00:04:00 Net Command 00:08:00 Windows Name Resolution 00:11:00 Dynamic DNS 00:05:00 DNS Troubleshooting 00:13:00 Section 11: Securing TCP/IP Making TCP/IP Secure 00:04:00 Symmetric Encryption 00:06:00 Asymmetric Encryption 00:03:00 Cryptographic Hashes 00:05:00 Identification 00:12:00 Access Control 00:04:00 AAA 00:05:00 Kerberos/EAP 00:08:00 Single Sign-On 00:10:00 Certificates and Trust 00:14:00 Certificate Error Scenarios 00:08:00 Section 12: Advanced Networking Devices Understanding IP Tunneling 00:06:00 Virtual Private Networks 00:13:00 Introduction to VLANs 00:12:00 InterVLAN Routing 00:03:00 Interfacing with Managed Switches 00:11:00 Switch Port Protection 00:07:00 Port Bonding 00:07:00 Port Mirroring 00:04:00 Quality of Service 00:05:00 IDS vs. IPS 00:04:00 Proxy Servers 00:13:00 Load Balancing 00:09:00 Device Placement Scenarios 00:13:00 Section 13: IPv6 Introduction to IPv6 00:13:00 IPv6 Addressing 00:15:00 IPv6 in Action 00:13:00 IPv4 and IPv6 Tunneling 00:05:00 Section 14: Remote Connectivity Telephony Technologies 00:09:00 Optical Carriers 00:03:00 Packet Switching 00:05:00 Connecting with Dial-up 00:05:00 Digital Subscriber Line (DSL) 00:05:00 Connecting with Cable Modems 00:04:00 Connecting with Satellites 00:03:00 ISDN and BPL 00:04:00 Remote Desktop Connectivity 00:05:00 Advanced Remote Control Systems 00:09:00 Section 15: Wireless Networking Introduction to 802.11 00:12:00 802.11 Standards 00:12:00 Power over Ethernet (PoE) 00:04:00 Antennas 00:09:00 Wireless Security Standards 00:16:00 Implementing Wireless Security 00:07:00 Threats to Your Wireless Network 00:07:00 Retro Threats 00:05:00 Wi-Fi Protected Setup (WPS) 00:05:00 Enterprise Wireless 00:06:00 Installing a Wireless Network 00:15:00 Wireless Scenarios 00:07:00 More Wireless Scenarios 00:09:00 Section 16: Virtualization and Cloud Computing Virtualization Basics 00:07:00 Cloud Ownership 00:03:00 Cloud Implementation 00:12:00 Your First Virtual Machine 00:09:00 NAS and SAN 00:16:00 Platform as a Service (PaaS) 00:09:00 Software as a Service (SaaS) 00:03:00 Infrastructure as a Service (IaaS) 00:10:00 Section 17: Mobile Networking Cellular Technologies 00:05:00 Mobile Connectivity 00:07:00 Deploying Mobile Devices 00:05:00 Mobile Access Control 00:06:00 Section 18: Building a Real-World Network Network Types 00:04:00 Network Design 00:10:00 Power Management 00:06:00 Unified Communications 00:11:00 Network Documentation 00:07:00 Contingency Planning 00:10:00 Predicting Hardware Failure 00:05:00 Backups 00:08:00 Section 19: Managing Risk What is Risk Management? 00:06:00 Security Policies 00:08:00 Change Management 00:07:00 User Training 00:03:00 Standard Business Documentation 00:05:00 Mitigating Network Threats 00:05:00 High Availability 00:05:00 Section 20: Protecting Your Network Denial of Service 00:09:00 Malware 00:10:00 Social Engineering 00:04:00 Access Control 00:08:00 Man-in-the-Middle 00:22:00 Introduction to Firewalls 00:05:00 Firewalls 00:10:00 DMZ 00:06:00 Hardening Devices 00:14:00 Physical Security Controls 00:09:00 Testing Network Security 00:08:00 Network Protection Scenarios 00:14:00 Section 21: Network Monitoring SNMP 00:15:00 Documenting Logs 00:09:00 System Monitoring 00:08:00 SIEM (Security Information and Event Management) 00:07:00 Section 22: Network Troubleshooting Network Troubleshooting Theory 00:05:00

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand23 hours 3 minutes
£10.99

CompTIA CySA+ Cybersecurity Analyst Course

4.5(3)

By Studyhub UK

Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00

CompTIA CySA+ Cybersecurity Analyst Course
Delivered Online On Demand11 hours 25 minutes
£10.99

Diploma in CompTIA A+

4.5(3)

By Studyhub UK

The 'Diploma in CompTIA A+' course provides comprehensive training on essential computer hardware, networking, and security topics. Students will learn about various components, peripherals, and technologies involved in building and maintaining computer systems, as well as securing them. Learning Outcomes: Understand the fundamentals of CompTIA A+ certification and its significance in the IT industry. Gain knowledge about computer hardware, including CPUs, RAM, motherboards, power supplies, and mass storage technologies. Acquire skills in networking concepts, local area networking, wireless networking, and internet technologies. Learn about virtualization, portable computing, mobile devices, printers, and multifunction devices. Develop an understanding of computer security practices and how to secure computers and networks effectively. Why buy this Diploma in CompTIA A+? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Diploma in CompTIA A+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Diploma in CompTIA A+ course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Diploma in CompTIA A+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Diploma in CompTIA A+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Diploma in CompTIA A+ is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: All about the CompTIA A+ CompTIA A+ 2019 Core 1 (220-1001) Course Introduction 00:02:00 What is the CompTIA A+? 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 1 (220-1001) Exam? 00:09:00 How to Pass the A+ Exam 00:04:00 How to Use This Video Course 00:03:00 Section 02: Safety and Professionalism Tools of the Trade 00:06:00 Troubleshooting Theory 00:10:00 Section 03: The Visible Computer Primary PC Connections 00:05:00 External Connections 00:11:00 Inside the PC 00:08:00 What is a Computer? 00:07:00 Section 04: CPUs What is a CPU? 00:15:00 CPU Speeds and Cores 00:12:00 Caching 00:00:00 CPU Sockets 00:12:00 Installing a CPU 00:11:00 Liquid Cooling 00:04:00 Section 05: RAM RAM Technology 00:11:00 RAM Capacity 00:08:00 RAM Features 00:07:00 Installing RAM 00:07:00 Section 06: Firmware What is the BIOS? 00:06:00 POST 00:09:00 System Setup 00:09:00 Troubleshooting Firmware 00:12:00 Section 07: Motherboards Form Factors 00:06:00 Chipsets 00:05:00 Touring the Motherboard 00:14:00 Touring the Case 00:07:00 Installing a Motherboard 00:09:00 Section 08: Power Supplies The Power Supply 00:09:00 Mounting a Power Supply 00:05:00 Choosing a Power Supply 00:08:00 Cooling Your PC 00:11:00 Troubleshooting Power Supplies 00:09:00 Troubleshooting Core Components 00:14:00 Section 09: Mass Storage Technologies Introduction to Mass Storage 00:13:00 Magnetic Disk Drives 00:08:00 Solid State Drives 00:08:00 SCSI 00:03:00 Boot Order 00:07:00 Section 10: Implementing Mass Storage New Installation - First Drive 00:05:00 RAID 00:11:00 Hardware RAID 00:07:00 Mass Storage Troubleshooting 00:08:00 Section 11: Essential Peripherals Optical Media 00:10:00 USB Standards 00:10:00 Understanding USB 00:11:00 Configuring USB 00:07:00 Thunder and Lightning 00:06:00 Keyboards and Mice 00:08:00 Sight and Sound 00:07:00 Readers and Scanners 00:08:00 Using Expansion Cards 00:08:00 Section 12: Building a PC The Right PC for the Job 00:13:00 Section 13: Display Technologies Monitor Technologies 00:08:00 LCD Breakdown 00:04:00 Graphics Cards and Connections 00:13:00 Installing a Graphics Card 00:07:00 Projectors 00:05:00 Troubleshooting Monitors 00:06:00 Section 14: Essentials of Networking Introduction to Networking 00:08:00 Hubs vs. Switches 00:05:00 Hexadecimal 00:07:00 WANs and Routers 00:09:00 Cables and Connectors 00:11:00 Crimping Cables 00:10:00 Structured Cabling 00:11:00 Section 15: Local Area Networking Introduction to TCP/IP 00:14:00 Network IDs and Subnet Masks 00:05:00 Special IP Addresses 00:09:00 NAT 00:07:00 Dynamic IP Addressing 00:10:00 IPv6 00:07:00 Port Numbers 00:12:00 TCP, UDP, and ICMP 00:06:00 Understanding DNS 00:09:00 Working with DNS 00:07:00 Windows Naming 00:08:00 Routers 00:12:00 Basic Router Configuration 00:12:00 Advanced Router Configuration 00:06:00 VLANs 00:07:00 Network Troubleshooting 00:05:00 Section 16: Wireless Networking Wireless Network Hardware 00:11:00 Wi-Fi Standards 00:10:00 Basic WAP Setup 00:11:00 Connecting to a Wi-Fi Network 00:09:00 It's a Huge Mesh 00:04:00 Beyond Wi-Fi 00:07:00 Troubleshooting Wireless Connections 00:07:00 Section 17: The Internet Beyond the LAN 00:03:00 Internet Tiers 00:06:00 Dial-up Connections 00:08:00 Broadband Connections 00:10:00 Firewalls and Servers 00:06:00 FTP 00:07:00 E-Mail 00:08:00 Proxy Servers 00:06:00 Virtual Private Networks (VPNs) 00:10:00 Internet of Things (IoT) 00:04:00 Section 18: Virtualization Understanding Virtualization 00:10:00 Your First Virtual Machine 00:11:00 Advanced Virtualization Setup 00:10:00 Cloud Computing 00:08:00 Cloud Ownership 00:03:00 Cloud-Based Applications 00:06:00 Section 19: Portable Computing Laptop Features 00:08:00 Laptop Hardware Troubleshooting - The Tools 00:05:00 Laptop Hardware - Core Hardware 00:04:00 Laptop Hardware - CPU and Motherboard 00:07:00 Touring Your Laptop Display 00:04:00 Section 20: Understanding Mobile Devices What is a Mobile Device? 00:09:00 Mobile Connections 00:10:00 Touring Android 00:10:00 Touring iOS 00:08:00 Virtual Reality 00:03:00 Section 21: Care and Feeding of Mobile Devices Maintaining Mobile Devices 00:11:00 Mobile Devices and E-mail 00:10:00 Mobile Synchronization 00:08:00 Section 22: Printers and Multifunction Devices Laser Printers 00:13:00 Inkjet Printers 00:08:00 Impact Printers 00:04:00 Thermal Printers 00:04:00 Installing a Local Printer 00:14:00 Sharing Printers 00:08:00 Installing Wireless and Cloud Printers 00:10:00 Troubleshooting Printers 00:10:00 3D Printing 00:07:00 Section 23: Securing Computers Dealing with Threats 00:07:00 Assignment Assignment - Diploma in CompTIA A+ 00:00:00

Diploma in CompTIA A+
Delivered Online On Demand17 hours 25 minutes
£10.99

CompTIA Security+

4.5(3)

By Studyhub UK

Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.  The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. Learning Outcomes Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. Acquire proficiency in various cryptographic methods and their importance in securing data. Gain insights into effective identity and account management to enhance system security. Learn to utilize essential security tools for safeguarding individual and network systems. Master the skills to implement and manage security measures for both wired and wireless networks. Why buy this CompTIA Security+? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aiming to start a career in cybersecurity. IT professionals seeking to deepen their knowledge in network security. System administrators wanting to enhance their security skills. Students interested in acquiring a foundational understanding of cybersecurity principles. Professionals aiming to achieve the CompTIA Security+ certification for career advancement. Prerequisites This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Cybersecurity Analyst: £30,000 - £60,000 annually Information Security Manager: £40,000 - £75,000 annually Network Security Engineer: £35,000 - £65,000 annually Security Consultant: £35,000 - £70,000 annually Systems Administrator (with security specialization): £25,000 - £50,000 annually IT Security Coordinator: £28,000 - £55,000 annually Course Curriculum Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00

CompTIA Security+
Delivered Online On Demand19 hours 23 minutes
£10.99

Computer Networks Security

By Compliance Central

Are you looking to enhance your Computer Networks Security skills? If yes, then you have come to the right place. Our comprehensive course on Computer Networks Security will assist you in producing the best possible outcome by mastering the Computer Networks Security skills. The Computer Networks Security course is for those who want to be successful. In the Computer Networks Security course, you will learn the essential knowledge needed to become well versed in Computer Networks Security. Our Computer Networks Security course starts with the basics of Computer Networks Security and gradually progresses towards advanced topics. Therefore, each lesson of this Computer Networks Security course is intuitive and easy to understand. Why would you choose the Computer Networks Security course from Compliance Central: Lifetime access to Computer Networks Security course materials Full tutor support is available from Monday to Friday with the Computer Networks Security course Learn Computer Networks Security skills at your own pace from the comfort of your home Gain a complete understanding of Computer Networks Security course Accessible, informative Computer Networks Security learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Computer Networks Security bundle Study Computer Networks Security in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Computer Networks Security Course Improve your chance of gaining in demand skills and better earning potential by completing the Computer Networks Security Computer Networks Security Curriculum Breakdown of the Computer Networks Security Course Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Computer Networks Security course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Computer Networks Security. It is also great for professionals who are already working in Computer Networks Security and want to get promoted at work. Requirements To enrol in this Computer Networks Security course, all you need is a basic understanding of the English Language and an internet connection. Career path The Computer Networks Security course will enhance your knowledge and improve your confidence. Network Security Specialist: £40,000 to £65,000 per year Information Security Analyst: £35,000 to £55,000 per year Cybersecurity Consultant: £45,000 to £70,000 per year Penetration Tester (Ethical Hacker): £35,000 to £60,000 per year Security Operations Center (SOC) Analyst: £30,000 to £50,000 per year Certificates CPD Accredited Certificate of Completion Free Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Certificate of Completion Free Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Computer Networks Security
Delivered Online On Demand8 hours
£12

Palo Alto Networks : Panorama: Managing Firewalls at Scale EDU-220 (11.0)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security Administrators, Security Operations Specialists, Security Analysts, Security Engineers, and Security Architects Overview The Palo Alto Networks Panorama 11.0: Managing Firewalls at Scale (EDU-220) course is two days of instructor-led training that should help you: Learn how to configure and manage the next-generation Panorama management server Gain experience configuring templates (including template variables) and device groups Gain experience with administration, log collection, and logging and reporting Become familiar with planning and design considerations for Panorama deployment This course should help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server?s role in managing and securing their overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.Learn how to configure and manage the next-generation Panorama? management server. Course Outline Module 1 - Initial Configuration Module 2 - Adding Firewalls Module 3 - Templates Module 4 - Device Groups Module 5 - Log Collection and Forwarding Module 6 - Using Panorama Logs Module 7 - Panorama Administrative Accounts Module 8 - Reporting Module 9 - Troubleshooting

Palo Alto Networks : Panorama: Managing Firewalls at Scale EDU-220 (11.0)
Delivered OnlineFlexible Dates
Price on Enquiry