• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

28 Hacking courses delivered Live Online

Advanced Bookkeeping Excel Courses online | Excel Training in Campus

By Osborne Training

Why Join Digital Marketing Training Course at Osborne Training Osborne Training is well Recognised for quality Regular Lectures led by Industry Expert Tutors Unlimited Access to the State of the Art Virtual Learning Campus Exclusive Access to High quality study materials Flexible payment option available Join Digital Marketing Training course as Pure Online or Blended with Classroom Delivery Access to Digital Marketing Internship for 3 months at the end of the training Unlimited Tutorial Support from expert tutors Get a Student Discount Card from NUS* Get a Free Tablet PC for limited period* Practical Hands-on Projects, Practical focused Assignments and Group-work for greater skills enhancement and understanding real life issues for real life problems Once you complete the bookkeeping course, you will get a certificate from Osborne Training confirming your professional Digital Marketing Qualifications. What jobs could I qualify for? Senior Digital Marketing Manager Digital Marketing Coordinator Executive Digital Marketing Strategist Digital Marketing Consultant In these roles, you could earn on average more than £40,000 annually (source: Reed Salary Checker, UK). Moreover, many go on to become successful (Millionaire sometime) entrepreneur by offering Digital Marketing services or formulating successful Digital Marketing Strategy for their own business. Digital Marketing Qualifications Digital Marketing Qualifications at Osborne Training are developed in Association with Google. Osborne Training offers Total Digital Marketing Course which combines all major skills required to be a successful Digital Marketeer and you also have option to join a complementary Internship at the end of your course. In joining the Total Digital Marketing Course at Osborne Training, you will make one of the greatest decision of your career and can look forward to a successful career in digital marketing. Digital Marketing Course Overview Total Digital Marketing Course covers major areas of Digital Marketing to make you completely ready for the digital era. The Digital Marketing course comes with optional Internship at the end of the training making you highly employable. Practical focused and hands-on approach of the training method helps you to be ready to offer real life solutions for real life problems. Digital Marketing Training Course Content Basics of marketing Marketing In Digital Era All About Web Search Engine Optimization Search Engine Marketing Affiliate Marketing Social Media Marketing Email marketing and nurturing (inbound) Mobile app marketing Content marketing Web, mobile and app analytics Growth Hacking Creating robust digital marketing strategy

Advanced Bookkeeping Excel Courses online | Excel Training in Campus
Delivered in Birmingham + 1 more or OnlineFlexible Dates
Price on Enquiry

Social Media Marketing Level 5

By NextGen Learning

Social Media Marketing Level 5 Course Overview: This Social Media Marketing Level 5 course offers a comprehensive exploration of key digital marketing strategies tailored to social media platforms. It covers essential topics like SEO, content marketing, email marketing, and growth hacking, enabling learners to understand the full spectrum of social media marketing techniques. By completing the course, learners will gain valuable insights into how to build and implement effective strategies across different platforms such as Facebook, Instagram, Twitter, and YouTube. The course prepares learners for practical application in real-world marketing scenarios, giving them the skills needed to increase engagement and drive conversions in the ever-evolving social media landscape. Course Description: The Social Media Marketing Level 5 course dives deep into the various facets of digital marketing, focusing on techniques that have the potential to scale businesses. It explores the fundamentals of digital marketing, growth hacking strategies, and the importance of the customer journey in creating successful campaigns. Key topics include SEO, content marketing, email marketing, and platform-specific marketing strategies such as those for Facebook, Instagram, Twitter, and YouTube. By the end of the course, learners will be proficient in building cohesive marketing strategies that align with business objectives and drive results. The course provides a structured learning experience that integrates theory with applicable skills for future marketing success. Social Media Marketing Level 5 Curriculum: Module 01: Fundamentals of Digital Marketing Module 02: Growth Hacking Module 03: Customer Journey Module 04: Content Marketing Module 05: SEO Module 06: E-Mail Marketing Module 07: Facebook Marketing Module 08: Instagram Marketing Module 09: Twitter Marketing Module 10: Youtube Marketing Module 11: Mobile Marketing (See full curriculum) Who is this course for? Individuals seeking to develop a solid understanding of social media marketing. Professionals aiming to enhance their digital marketing skills for career progression. Beginners with an interest in pursuing a career in social media marketing. Marketing enthusiasts who want to deepen their knowledge of platform-specific strategies. Career Path: Social Media Manager Digital Marketing Specialist Content Strategist SEO/SEM Expert Social Media Analyst Email Marketing Specialist Brand Manager Marketing Consultant

Social Media Marketing Level 5
Delivered OnlineFlexible Dates
£7.99

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Digital Marketing: The Ultimate Guide to Strategic Marketing

By NextGen Learning

Course Overview This comprehensive course in Digital Marketing offers an in-depth exploration of the strategies that define modern online success. From brand positioning and content creation to platform-specific approaches across Facebook, Instagram, and YouTube, this guide covers every key area to help learners thrive in a fast-evolving marketing landscape. You will examine essential digital concepts such as SEO, mobile outreach, and email campaign structuring, all while gaining the strategic mindset needed to implement effective marketing solutions. By the end of this course, learners will have a strong understanding of how to structure marketing plans, reach targeted audiences through various channels, and evaluate digital performance metrics. This course is ideal for those looking to enhance their marketing knowledge, keep up with digital trends, and align themselves with career opportunities in a digitally driven economy. Course Description The course delves into the strategic core of digital marketing, equipping learners with the knowledge to understand consumer behaviour, design impactful campaigns, and master various online platforms. You will begin with the fundamentals before advancing through growth hacking techniques, customer journey mapping, and platform-specific strategies across Facebook, Instagram, Twitter, and more. Topics such as SEO, email communication, content strategy, and mobile marketing are presented with clarity, ensuring learners develop a thorough grasp of marketing logic and campaign planning. This course also explores how to build audience engagement and interpret campaign performance using reliable frameworks. Whether you're aiming to support a brand, manage digital channels, or enhance visibility through marketing strategies, this course offers a structured foundation that meets the demands of today’s digital environment. Course Modules Module 01: Fundamentals of Digital Marketing Module 02: Growth Hacking Module 03: Customer Journey Module 04: Content Marketing Module 05: SEO Module 06: E-Mail Marketing Module 07: Facebook Marketing Module 08: Instagram Marketing Module 09: Twitter Marketing Module 10: YouTube Marketing Module 11: Mobile Marketing (See full curriculum) Who is this course for? Individuals seeking to understand digital marketing strategy from the ground up. Professionals aiming to expand their expertise in multi-channel marketing. Beginners with an interest in online promotion, brand development, or digital outreach. Entrepreneurs, freelancers, and content creators wanting to enhance their marketing knowledge. Career Path Digital Marketing Executive Social Media Manager SEO Specialist Content Marketing Strategist Email Marketing Coordinator Digital Campaign Analyst Brand Engagement Consultant Online Marketing Assistant

Digital Marketing: The Ultimate Guide to Strategic Marketing
Delivered OnlineFlexible Dates
£9.99

Salon Success Coaching Program

By Peaches Training Academy

An 8 week coaching programme like no other. Discover how to build your business, free your time all the while making more money and doing more of the stuff you love. Stop not-earning when you're off on holiday, off for the weekend or off sick... Create a business that works for you, even when you're not there.

Salon Success Coaching Program
Delivered OnlineJoin Waitlist
£1,111

Social Media Marketing Level 5

By NextGen Learning

Course Overview The Social Media Marketing Level 5 course provides a comprehensive exploration of the modern digital landscape, equipping learners with the expertise to design, implement, and manage strategic marketing campaigns across major social platforms. Through a structured learning journey, this course offers in-depth insights into the latest marketing techniques, consumer behaviour analysis, and brand growth strategies. Learners will develop a strong understanding of how to engage audiences, optimise content, and leverage data-driven approaches to drive results. By the end of the course, participants will be equipped to contribute to business success through innovative marketing initiatives, whether for personal ventures or organisational objectives. Designed for individuals at various stages of their career, this programme empowers learners to stay ahead in a competitive market by mastering dynamic digital tools and techniques essential for success in the ever-evolving world of social media marketing. Course Description Throughout the Social Media Marketing Level 5 course, learners will delve into a broad range of topics crucial to achieving success in the digital marketing arena. Starting with the fundamentals of digital marketing, the programme moves through growth hacking strategies, customer journey mapping, content development, and search engine optimisation. Dedicated modules explore platform-specific marketing techniques for Facebook, Instagram, Twitter, and YouTube, as well as mobile and e-mail marketing approaches. The course fosters the development of strategic thinking, analytical capabilities, and content management skills essential for enhancing brand visibility and audience engagement. Learners will also explore how to optimise marketing efforts based on key performance metrics and consumer insights. With a curriculum tailored to current industry standards, this course prepares individuals to navigate the complex social media landscape confidently and innovatively, ensuring they are well-positioned for career advancement and professional growth in the digital marketing sector. Course Modules Module 01: Fundamentals of Digital Marketing Module 02: Growth Hacking Module 03: Customer Journey Module 04: Content Marketing Module 05: SEO Module 06: E-Mail Marketing Module 07: Facebook Marketing Module 08: Instagram Marketing Module 09: Twitter Marketing Module 10: Youtube Marketing Module 11: Mobile Marketing (See full curriculum) Who is this course for? Individuals seeking to build a strong foundation in digital and social media marketing. Professionals aiming to enhance their marketing strategies and career progression. Beginners with an interest in exploring the world of digital branding and communication. Entrepreneurs and business owners wanting to boost their online presence. Marketing students and graduates looking to deepen their practical knowledge of social media trends. Career Path Social Media Manager Digital Marketing Executive Content Strategist SEO Specialist Brand Communications Officer Online Community Manager E-Commerce Marketing Coordinator Digital Advertising Specialist Influencer Marketing Executive Marketing Consultant

Social Media Marketing Level 5
Delivered OnlineFlexible Dates
£9.99

Coding (HTML, C++, Python, JavaScript & IT)

By NextGen Learning

Course Overview This comprehensive course on Coding (HTML, C++, Python, JavaScript & IT) offers a structured introduction to the world of coding and information technology. It covers an expansive array of programming languages and technologies, including HTML, CSS, JavaScript, C++, Python, and PHP, alongside key IT concepts such as cybersecurity, cloud computing, and network security. Learners will develop a deep understanding of programming logic, software development, web development, and essential IT operations. Whether you're aiming to explore programming for the first time or expand your technical skill set, this course equips you with the knowledge required to navigate modern computing systems and coding environments. Upon completion, learners will be better prepared to pursue roles in web development, programming, system administration, and IT support across various industries. Course Description This course delivers an in-depth exploration of both coding and IT fundamentals, offering a diverse curriculum that spans core programming languages such as HTML, C++, Python, JavaScript, and R. It extends into cybersecurity, Linux scripting, ethical hacking, and computer networking—creating a well-rounded foundation for digital fluency. Learners are introduced to the design and development of web applications, front-end and back-end technologies, and essential tools such as GitHub, Heroku, and MySQL. The course further includes IT administration, encryption methods, cloud infrastructure, and system troubleshooting, ensuring coverage of key concepts necessary in today’s tech-driven world. With a focus on conceptual clarity and structured progression, learners will gain valuable knowledge aligned with current industry needs and expectations. Course Modules Module 01: Introduction to Coding With HTML, CSS, & Javascript Module 02: C++ Development: The Complete Coding Guide Module 03: Python Programming: Beginner To Expert Module 04: Learn Ethical Hacking From A-Z: Beginner To Expert Module 05: Bash Scripting, Linux and Shell Programming Module 06: JavaScript Project – Game Development with JS Module 07: R Programming for Data Science Module 08: Secure Programming of Web Applications Module 09: Advanced Diploma in PHP Web Development with MySQL, GitHub & Heroku Module 10: The Complete Front-End Web Development Course! Module 11: The Complete MySQL Server from Scratch: Bootcamp Module 12: Cyber Security Awareness Training Module 13: Cloud Computing / CompTIA Cloud+ (CV0-002) Module 14: CompTIA A+ (220-1001) Module 15: Building Your Own Computer Module 16: Computer Networks Security from Scratch to Advanced Module 17: IT Administration and Networking Module 18: Encryption Module 19: Advance Windows 10 Troubleshooting for IT HelpDesk Module 20: Microsoft Excel Complete Course (See full curriculum) Who is this course for? Individuals seeking to understand programming languages and IT fundamentals. Professionals aiming to transition into coding or expand their IT knowledge. Beginners with an interest in computing, programming, or digital technologies. Students or career changers preparing for roles in the tech sector. Career Path Web Developer Software Programmer IT Support Technician Network Administrator Cybersecurity Analyst Cloud Computing Technician Data Analyst Systems Engineer Helpdesk Specialist IT Consultant

Coding (HTML, C++, Python, JavaScript & IT)
Delivered OnlineFlexible Dates
£9.99

Educators matching "Hacking"

Show all 117
Edifylabs

edifylabs

London

^bout Us Our team of expert cyber security consultants leverage years of experience and intelligence from a number of sectors including: national security, public service operations, finance, telecommunications, and commercial cyber operations. Our advice is always tailored to your business needs and ambitions, providing a bespoke and balanced report that contrasts between security controls and enabling your business functions for your information technology systems. We are able to provide an assessment on how your organisation is currently protected against existing cyber attacks and we can translate technical analysis into clear and pragmatic advice and actions, to be used as the basis of a cyber security implementation plan. At Edifylabs we are committed to making cyber security easier to understand; We are experienced in consulting with big enterprises, small-medium-enterprises(SMEs) and even start-ups! Cyber security/maturity doesn’t have to be a dauting concept, and we’re here to support your team and increase your awareness and capabilities on cyber attacks and defences. Our mission is to provide:Trust, Independence, & Knowledge Sharing. Through our three main core services: Attack, Respond, & Protect Our three services sub-divide into the following activities: Attack Pentesting (or Penetration Testing) Red Teaming Respond Blue Teaming Incident Response Malware Prevention Protect Security Architecture Cyber Security Consultancy Data Privacy & GDPR Our solutions and services are not restricted to products from a single vendor or platform. Based on the client’s requirements, we decide which products are best suited to their needs and work accordingly. We have strategic partnerships and domain expertise with most of the well-known names in the cyber forensic and cybersecurity industry. We offer a complete portfolio of forensic and security services: Data Breach Disk Forensics Mobile Forensics Computer Forensics Vulnerability Assessment SIEM Services App Security Proactive IPS Endpoint Security

Delhi Institute of Computer Courses

delhi institute of computer courses

Delhi Institute of Computer Courses (DICC) was founded in 2009 with an aim to provide high-quality education to its students. Our goal is to provide standard, professional and practical training to our students. There are lots of institutes today that charges lots of amount from you and didn’t provide you what you deserve. We value your money and offer professional training programs such as stock market technical analysis, digital marketing, ethical hacking, PHP and Web designing etc at a really affordable cost. Our aim is to satisfy our students completely so that they only give us positive reviews. So far we have trained more than 2000 students in a span of six years and all the students are completely satisfied with our trainers. We never focus on taking out big cash from your pockets but only charge suitable amount and give best value and services to your money. We have the great reputation in providing high quality training and we already have delivered lectures on stock market, ethical hacking and digital marketing in the universities and colleges. We have also conducted workshops and seminars at Delhi University Colleges. We are gaining popularity gradually and we maintain the reputation and standard till now. We never compromise with our standards of delivering high quality lectures to our students. We fulfil promises with our students and never play with their careers. So, if you too would not like to be catch in the hands of money-making people than JOIN DICC NOW!

Blitz Educational Academy

blitz educational academy

London

Blitz Academy is one of the best educational institution working since 2011, in Cochin Kerala. We provide best training & government Certification in the field of Mechanical, Electrical, Civil and Quality Management Engineering. We offer unique opportunities to face challenges through our enriched learning, academic excellence, professional training and corporate exposure. We deliver courses and examinations to all major industrial sectors like oil & gas, aerospace, construction, power and automotive. we offer oil and gas courses in kerala . We are one of the top training institution in Kerala. Our Courses are assigned to provide a good volume of Knowledge and high degree of skills. Our training is mainly practical oriented rather than just classroom theory which makes it unique in this field of training. We count amongst unrivalled quality of training and assessment leading to internationally recognized qualification which is in demand by various industries worldwide. Blitz Academy offers top rated QA & QC courses in kerala. We provide training and certification in various fields and thus play a vital role in socio economic progress of the nation by producing high quality engineers. We provide industrial training and examination services via its global network of offices and training centres. In addition to regular curriculum every department organizes technical seminars, industrial visits, onsite training, and practical’s to expose the students to the real world environments. We offer 100% job guarantee for the efficient students who have successfully completed our courses and industrial training programs. We offer tutoring services for the students to fulfil their ongoing education, training and certification requirements with real experienced hands from various industries. Our training labs are facilitated with advanced machines and equipments used in the industries. We ensure 100% security in our labs along with highly equipped training machines. We are renowned institute in NDT, Oil & Gas, QA/QC, MEP, HVAC, Logistics & Accounting– Kochi, Kottayam, Adoor and Pathanamthitta Kerala. What is KASE ? Kerala Academy for Skills Excellence, a section 25 company under the Department of Labour and Skills, Government of Kerala, promote, establish, set up, monitor, govern, and regulate institutions and academies for skills excellence for development of core employability skills, compentency standards and for promoting technology that meets the demands of various industries. KASE is also the state Skill Developement Mission of Kerala to facilitate and coordinate all the skill initiatives of the state in the line whith the objective of the skill India Mission. KASE Accreditation KASE accociate with private companies or firms involved in employability enhancing skill development through International Skill Training and Employability Programme(iSTEP). The iSTEP process, which involves multiple levels of scrutinization by industry experts and Government Bureaucrats, select skill training partners or skill development courses. KASE Accreditation is provide to the employability enhancing skill development courses conducted within Kerala by institution that meet the ISTEP eligibility criteria. All the courses accredited by KASE ensure a minimum of 60% placement per batch. KASE has accredited diploma in oil and gas, mechanical QA/QC, Ndt, piping and pipeline engineering, QC in weling inspection, Civil QC, Quantity surveying, Construction Mangement,MEP Course in Kerala (MEP Engineering), HVAC Engineering courses conducted at Blitz Academy, Kochi kerala.