• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6 Hacking courses in Edinburgh

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Definitive Firewalls for engineers

5.0(3)

By Systems & Network Training

Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.

Definitive Firewalls for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

ONE YEAR SHAMANIC PRACTITIONER TRAINING 2025-26

4.9(30)

By School of Shamanism

Who is this course for: This course is for Spiritual Explorers that: *are already open to energy and to the spiritual vision of the world, *are not living blindly following the rules of the matrix, but try to follow their hearts and intuition *want to go beyond the barriers of the ordinary world and access the wisdom and energy healing powers of the spirits to help themselves and others; *want to realise themselves in the totality of their potential, in order to live a genuine life mission and become evolved human beings; *want to go through a deep inner transformation and inner work for the evolution of their souls. What you will learn: This intense one year course has been designed combining together the Toltec and the Japanese tradition of shamanism and no experience is required to attend. It will allow you to qualify as a Professional Shamanic Practitioner.  Shamanism has survived for millennia because of its effectiveness and adaptability. In some cultures it is still a reference spiritual practice, in our modern culture it is increasingly an alternative practice for healing the soul and for all health issues that cannot be solved by official science. In these times of great change, spiritual practice, done humbly but also with purpose, can transform our society.  The vision is to educate you to become a shamanic practitioner experiencing this vast and diverse healing heritage, applying it with courage and commitment in your own environment.  The term "professional" means someone who has solid experience working with other people safely and effectively. You will follow a very deep path of healing, transformation and personal empowerment necessary to work ethically and professionally in the field of shamanic healing. Through deep initiations you can open ever wider doors to the spiritual world necessary to become true channels of healing and inexhaustible sources of spiritual wisdom WHEN last week-end of the month per 13months (different dates in December due to Christmas) break in July and August) 10am-5pm GMT time each day 25th-26th October 2025 29th-30th November 2025 13th-14th December 2025 24th-25th January 2026 21st-22nd February 2026 28th-29th March 2026 25th-26th April 2026 30th-31st May 2026 27th-28th June 2026 26th-27th September 2026 24th-25th October 2026 28th-29th November 2026 12th-13th December 2026 You have time till the 28th November 2025 to sign up. If you miss the first week-end, the recording will be sent to you. After this date, no more applications will be taken. You are ideally required to attend all the week-ends, online or in person but I understand sudden circumstances may occur. You will be allowed to miss maximum two week-ends, for which you will get the recordings and you will be required to do home-works, in order to get your certificate. If your absence is over this, we'll need to speak and consider your personal circumstances. PROGRAMME ECSTASY: SHAMANIC JOURNEYS AND OTHER METHODS POWER ANIMALS , SPIRIT GUIDES AND SPIRIT NAMES (find your own one) POWER DANCE SHAMANIC TOOLS THE ART OF STORYTELLING: HACKING THE MIND PILGRIMAGES SHAMANIC HEALING: SOUL RETRIEVAL AND EXTRACTIONS SOUL REMEMBRANCE THE ART OF DIVINATION RITUALS AND CEREMONIES THE ANCESTRAL REALMS: PAST LIVES PSYCHOPOMP AND DEATH AS AN ALLY FOREST THERAPY : JAPANESE SHAMANIC RITUALS  BEING A SPIRITUAL WARRIOR IN THE YAMABUSHI TRADITION CREATIVITY AS AN HEALING TOOL  THE MEDICINE WHEEL  THE ARCHETYPES AND CHAOS CYCLES SHAMANIC COUNSELLING AND THE GARDEN OF SOULS HEALING CIRCLES INTRODUCTION TO CACAO CEREMONIES HOW TO WORK WITH CLIENTS FINAL CEREMONY FULL COURSE £250 non-refundable deposit, followed by 12 monthly instalments according to your income: Early bird offer by 30th April 2025 High £195/month (total of the course £2590) Medium £185/month (total of the course £2470) Low £156/month (total of the course £2122) Full price from 1st May 2025 High £216/month (total of the course £2842) Medium £205/month (total of the course £2710) Low £173/month (total of the course £2326) CANCELLATION AND PAYMENTS A booking is accepted following receipt of a non refundable deposit payment, followed by monthly instalments. Any cancellation occurring after the start of the course will still be subject to the payment in full of the remaining instalments.  Disclaimer  By booking any event or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims/School of Shamanism, Art and Spirituality and any business partners working with for the event from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by the law according to my current insurance.   Added element of the disclaimer If the class happens in any venue and you are causing any damage to the property, you are taking responsibility of your actions. It is down to the individual to take personal responsibility when participating in physical activity and when entering a space that is used and shared by other parties. Invisible Caims does not take any responsibility about possible risks that may arise but can only advise and enforce guidelines and legal requirements as defined by the Scottish Government and local authorities.  Giada's Journey Creative explorer of the human well-being with twenty years’ experience running events, workshops and retreats. Co-author of a non-profit book with other 33 Italian women about their stories in different countries. She has been learning to heal herself supportinga Holistic connection between mind, body and spirit. She has been studying and practicing Buddhist teachings, meditation and the Five Tibetan Rites Yoga in Nepal, India and Italy. Approached the imaginal world and dreams with the psychologist Elio Occhipinti and a regressive hypnosis journey with the vision of the psychiatrist Brian Weiss.  Her studies and practice have helped her become: Shamanic Practitioner and Teacher with the two years formal training at Anam Cara and one year in Wales Shamanic and Integral Yoga Teacher, Ikigai Coach,Forest Therapy Guide qualified with Selene Calloni Williams at the Imaginal Academy and part of the Italian-Swiss Association for Counselling and Coaching, Aiscon.  Professional Esoteric Numerologist graduated at The Connaissance School of Numerology Corporate Mental Health Coach achieved with WeFocus Founder of Drink In Art exhibitions of local artists in private flats Founder of Invisible Caims creative and spiritual workshops, classes and therapies Founder of the Art and Spirituality Centre centre for creativity and well-being in Edinburgh

ONE YEAR SHAMANIC PRACTITIONER TRAINING 2025-26
Delivered Online & In-Person in Edinburgh + more
£250

Educators matching "Hacking"

Show all 1