• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

444 Linux courses in Birmingham delivered On Demand

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£24

Certified Cloud Engineer Pathway with Career Guarantee

By NuYew Ltd

Accelerate Your Cloud Engineer Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration9 months · Self-paced Access to content5 years CertificationsCompTIA A+CompTIA Cloud+CompTIA Network+CompTIA Security+CompTIA IT Fundamentals CertificationMicrosoft Azure Data Fundamentals Certificates Official CompTIA Certification - Free Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy If you enjoy problem solving and have good analytical skills, this could be the career for you. Cloud Network Engineers implement, maintain, support, develop and sometimes design communications networks and can work as part of an Internal Support Team or for an outsourced IT Networking Consultancy. In bigger companies, you may look after one specific area of a network or if working for smaller businesses you could be expected to troubleshoot any IT related problem. Certifications CompTIA A+ CompTIA Cloud+ CompTIA Network+ CompTIA Security+ CompTIA IT Fundamentals Certification Awarded by CompTIA Microsoft Azure Data Fundamentals Awarded by Microsoft Description With a national shortage of Cloud Network Engineers, starting salaries of up to £25,000 per annum (average UK Salary £52,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Cloud Network Engineer Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA Cloud+ OR CompTIA Server+ OR CompTIA Linux+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our Career Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Cloud Network Engineering. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £52.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation. Certificates Official CompTIA Certification Hard copy certificate - Included We provide Official CompTIA Certificates for all courses included (ITF+, A+(2), Network+, Security+, Cloud+.

Certified Cloud Engineer Pathway with Career Guarantee
Delivered Online On Demand1 hour
£3,196

Becoming a Cloud Expert - Microsoft Azure IaaS - Level 2

By Packt

Learn to effectively monitor the performance, health, and availability of Azure Services and your cloud resources

Becoming a Cloud Expert - Microsoft Azure IaaS - Level 2
Delivered Online On Demand3 hours 25 minutes
£37.99

DevOps Fundementals: Maven and SonarQube for Engineers

By IOMH - Institute of Mental Health

Overview This DevOps Fundementals: Maven and SonarQube for Engineers course will unlock your full potential and will show you how to excel in a career in DevOps Fundementals: Maven and SonarQube for Engineers. So upskill now and reach your full potential. Everything you need to get started in DevOps Fundementals: Maven and SonarQube for Engineers is available in this course. Learning and progressing are the hallmarks of personal development. This DevOps Fundementals: Maven and SonarQube for Engineers will quickly teach you the must-have skills needed to start in the relevant industry. In This DevOps Fundementals: Maven and SonarQube for Engineers Course, You Will: Learn strategies to boost your workplace efficiency. Hone your DevOps Fundementals: Maven and SonarQube for Engineers skills to help you advance your career. Acquire a comprehensive understanding of various DevOps Fundementals: Maven and SonarQube for Engineers topics and tips from industry experts. Learn in-demand DevOps Fundementals: Maven and SonarQube for Engineers skills that are in high demand among UK employers, which will help you to kickstart your career. This DevOps Fundementals: Maven and SonarQube for Engineers course covers everything you must know to stand against the tough competition in the DevOps Fundementals: Maven and SonarQube for Engineers field.  The future is truly yours to seize with this DevOps Fundementals: Maven and SonarQube for Engineers. Enrol today and complete the course to achieve a DevOps Fundementals: Maven and SonarQube for Engineers certificate that can change your professional career forever. Additional Perks of Buying a Course From Institute of Mental Health Study online - whenever and wherever you want. One-to-one support from a dedicated tutor throughout your course. Certificate immediately upon course completion 100% Money back guarantee Exclusive discounts on your next course purchase from Institute of Mental Health Enrolling in the DevOps Fundementals: Maven and SonarQube for Engineers course can assist you in getting into your desired career quicker than you ever imagined. So without further ado, start now. Process of Evaluation After studying the DevOps Fundementals: Maven and SonarQube for Engineers course, your skills and knowledge will be tested with a MCQ exam or assignment. You must get a score of 60% to pass the test and get your certificate.  Certificate of Achievement Upon successfully completing the DevOps Fundementals: Maven and SonarQube for Engineers course, you will get your CPD accredited digital certificate immediately. And you can also claim the hardcopy certificate completely free of charge. All you have to do is pay a shipping charge of just £3.99. Who Is This Course for? This DevOps Fundementals: Maven and SonarQube for Engineers is suitable for anyone aspiring to start a career in DevOps Fundementals: Maven and SonarQube for Engineers; even if you are new to this and have no prior knowledge on DevOps Fundementals: Maven and SonarQube for Engineers, this course is going to be very easy for you to understand.  And if you are already working in the DevOps Fundementals: Maven and SonarQube for Engineers field, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  Taking this DevOps Fundementals: Maven and SonarQube for Engineers course is a win-win for you in all aspects.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements This DevOps Fundementals: Maven and SonarQube for Engineers course has no prerequisite.  You don't need any educational qualification or experience to enrol in the DevOps Fundementals: Maven and SonarQube for Engineers course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online DevOps Fundementals: Maven and SonarQube for Engineers course. Moreover, this course allows you to learn at your own pace while developing transferable and marketable skills. Course Curriculum Introduction Introduction to Maven 00:01:00 Topics Covered in this Course 00:03:00 How Maven Helps to a DevOps Engineer 00:02:00 Resource to Start 00:01:00 Setup Maven Environment on Windows Setup Maven Environment on Windows 00:01:00 Java Installation on Windows 00:05:00 Eclipse Installation 00:03:00 Create 1st Maven Project 00:04:00 Maven Coordinates 00:07:00 Default Directory Structure 00:03:00 Steps Involved to Build a Java Project 00:02:00 Maven Goals 00:06:00 Maven Goals in Action 00:07:00 Maven Goals, Repositories What is pom.xml and How it Works 00:05:00 About the Section 00:02:00 Maven Repositories 00:06:00 Maven goals - Deploy Goal for Local Repository 00:03:00 Push Maven Project onto GitHub 00:08:00 Maven on Linux Create an EC2 Instance 00:04:00 Prerequisites to Setup Maven 00:05:00 Setup Maven 00:04:00 Build Maven Project on Linux 00:10:00 Common Maven Goals 00:03:00 Create a Project with Maven Archetype 00:06:00 Plugins and dependencies in pom.xml 00:09:00 Settings.xml file 00:03:00 Tomcat Server Configurations 00:05:00 Deploy war on Tomcat Server 00:10:00 Maven in DevOps workflow Maven in DevOps workflow 00:01:00 Jenkins Installation 00:07:00 Add Maven Build Server as an Agent to Jenkins 00:07:00 Build Jenkins Job on Slave Node 00:07:00 Build a war file on Agent Node (Maven Server) 00:04:00 Additional Resources Create an AWS account 00:06:00 Install Git bash 00:03:00 Connect to a Linux with Mobaxterm 00:04:00 Install Tomcat 00:11:00 SonarQube SonarQube Introduction 00:07:00 SonarQube Installation 00:11:00 SonarQube Console Overview 00:14:00 SonarQube Installation with PostgreSQL Database 00:29:00 SonarQube Integration with Jenkins 00:15:00

DevOps Fundementals: Maven and SonarQube for Engineers
Delivered Online On Demand4 hours 14 minutes
£11.99

Computer Science - CPD Certified Training

4.9(27)

By Apex Learning

'There are 10 types of people in this world, those who understand binary and those who don't.' Computer science is currently one of the most sought-after skills in the job market and ranks among the top ten highest-paying degrees in the UK. With an average salary of £57,500, expertise in computer science is highly valued due to the ever-evolving technological landscape. Our comprehensive computer science course is designed to provide you with the knowledge and skills necessary to stay ahead in this competitive field. This computer science course is an excellent starting point for anyone interested in exploring the principles of computer science or pursuing a career in programming or software development. Through detailed instruction and hands-on experience, you'll gain the insights needed to excel and adapt in the rapidly changing world of technology. Along with this Computer Science course, you will get 10 premium courses, an original hardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. Begin your journey into the realm of computer science today and equip yourself with the tools to thrive in the dynamic tech industry! This Computer Science Bundle Consists of the following Premium courses: Course 01: Computer Science With Python Course 02: Python Programming for Everybody Course 03: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 04: Coding with HTML, CSS, & Javascript Course 05: Diploma in PHP Web Development Course 06: Ultimate PHP & MySQL Web Development Course & OOP Coding Course 07: Ethical Hacking with Kali Linux Course 08: SQL Server for Beginners Course 09: Encryption Course 10: Level 3 Cyber Security Course 11: Building Your Own Computer Key Features of the Course: FREE Computer Science - CPD Certified Training CPD-accredited certificate Get a free student ID card with Computer Science - CPD Certified Training (£10 applicable for international delivery) Lifetime access to the Computer Science - CPD Certified Training course materials The Computer Science - CPD Certified Training program comes with 24/7 tutor support Get instant access to this Computer Science - CPD Certified Training course Learn Computer Science - CPD Certified Training from anywhere in the world The Computer Science - CPD Certified Training is affordable and simple to understand The Computer Science - CPD Certified Training is entirely online Learning Outcomes: Upon completing this comprehensive Computer Science - CPD Certified course bundle, you will be able to: Develop and apply Python programming skills for various applications. Utilize HTML, CSS, and JavaScript for web development and design. Implement and manage cloud solutions with CompTIA Cloud+ (CV0-002). Design and build dynamic web applications using PHP and MySQL. Perform ethical hacking and understand cybersecurity principles with Kali Linux. Encrypt and secure data effectively while gaining foundational knowledge in SQL Server and building your own computer. Certificate: PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Computer Science expertise and essential knowledge, which will assist you in reaching your goal. CPD 115 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Computer Science bundle. Requirements Our Computer Science is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This Computer Science course has been designed to be fully compatible with tablets and smartphones so that you can access your course on Wi-Fi, 3G or 4G. Career path People in this sector tend to pursue their careers in the following professions Software Engineer Database Administrator Network Systems Administrator Web Developer Information Security Analyst The salary range for Computer Science professions in the UK is typically between £40,000 and £60,000 per annum. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Computer Science With Python) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Computer Science - CPD Certified Training
Delivered Online On Demand1 hour
£49

IT Support Technician Certification Bundle with 5 Exams

By Hudson

This course is aimed at anyone looking to gain entry into the IT field as an IT Support Technician. Support Technicians are the backbone of any IT department. They ensure the smooth running of the IT within a company or organisation and offer guidance to anyone needing assistance. As a result, technical support is one of the most abundant jobs available within the IT industry.

IT Support Technician Certification Bundle with 5 Exams
Delivered Online On Demand
£889

CEH: Learn Ethical Hacking From A-Z: Beginner To Expert

4.5(3)

By Studyhub UK

Welcome to the Learn Ethical Hacking From A-Z: Beginner To Expert course! This practical course was designed for beginners or those with no prior experience or knowledge in hacking or cybersecurity. The goal of this course is to teach you not only what and how hackers do but also how to hack systems like a pro and win the cat-and-mouse game by securing systems like a professional security expert.   We take you from the beginnings of ethical hacking to mastery by combining practical work with good theoretical training, providing you with the training you need to hack and secure against a hack. While theory is important, we recognise that it can sometimes be boring and uninspiring. As a result, this course is jam-packed with examples that you can use, making the lessons more fun and engaging.    This practical approach begins with a lesson on Networking Basics and how to install the necessary software (Windows, Linux, and Mac OSX) before diving right into hacking. Throughout, you will examine and exploit many systems ranging from simple websites to large networks, as well as hacking servers and clients. In addition to hacking, you'll learn how to execute effective penetration testing procedures.   This approach provides you with the fundamental knowledge required not only to hack any given system but also to secure it, with each lesson covering both sides of the coin. It's a complete course, so you won't have to look elsewhere to learn. Don't waste any more time. Enrol today and be on your way to becoming a hacking expert.   Learning Outcomes: Upon completion of the Learn Ethical Hacking From A-Z course, you will be able to: Understand the fundamentals of ethical hacking and its applications. Build a secure hacking lab for practical experimentation and learning. Master essential networking concepts for effective penetration testing. Develop proficiency in Linux, Python, Bash, and PowerShell for hacking tasks. Learn techniques to remain anonymous and protect your online identity. Gain expertise in hacking into WIFI networks and securing them. Conduct passive and active reconnaissance for effective information gathering. Acquire skills in website and web application hacking for vulnerability assessment.   Who is this course for: This Learn Ethical Hacking From A-Z course is perfect for: Tech enthusiasts eager to expand their knowledge in ethical hacking. Individuals aspiring to start a career in cybersecurity and ethical hacking. IT professionals seeking to enhance their skill set in cybersecurity. Students pursuing computer science or related fields interested in ethical hacking. Security professionals looking to broaden their expertise in penetration testing.   Why buy this Learn Ethical Hacking From A-Z course? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one-to-one assistance when needed Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript immediately Easily learn the skills and knowledge from the comfort of your home   Career Path: Our Learn Ethical Hacking From A-Z course will prepare you for a range of careers, including: Junior Penetration Tester: £25,000 - £50,000 Annually Ethical Hacker: £40,000 - £100,000 Annually Security Consultant: £50,000 - £90,000 Annually Security Engineer: £60,000 - £110,000 Annually Senior Penetration Tester: £70,000 - £120,000 Annually Chief Information Security Officer (CISO): £100,000 - £180,000 Annually   Certification After studying the course materials of the Learn Ethical Hacking From A-Z: Beginner To Expert course, there will be a written assignment test which you can take either during or at the end of the course. After passing the test, you will have a range of certification options. A CPD Accredited PDF Certificate costs £4.99, while a CPD Accredited Hardcopy Certificate is £8.00. We also offer transcript services. A PDF Transcript costs £4.99, and a Hardcopy Transcript is £9.99. Select according to your needs, and we assure timely delivery of your chosen certificate.   Requirements This professionally designed Learn Ethical Hacking From A-Z: Beginner To Expert course does not require you to have any prior qualifications or experience. It is open to everyone, and you can access the course from anywhere at any time. Just enrol and start learning!

CEH: Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£10.99

IT Security & Cyber Security

4.9(27)

By Apex Learning

11 in 1 "IT Security & Cyber Security" Bundle only at £53 Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This IT Security & Cyber Security bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this IT Security & Cyber Security bundle will help you stay ahead of the pack. Throughout the IT Security & Cyber Security programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this IT Security & Cyber Security course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This IT Security & Cyber Security Bundle Consists of the following Premium courses: Course 01: Computer Networks Security Course 02: Cyber Security Incident Handling and Incident Response Course 03: CyberSecurity Law Online Course Course 04: Crash Course on Ecommerce Security Course 05: Linux Security and Hardening Course 06: Secure Programming of Web Applications Course 07: Complete Web Application Penetration Testing & Security Course 08: Data Protection and Data Security Level 2 Course 09: Information Management Course 10: Security Management Advanced Diploma Course 11: Internet of Things Hacking Enrol now in IT Security & Cyber Security to advance your career, and use the premium study materials from Apex Learning. How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your IT Security & Cyber Security expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Curriculum of Bundle Course 01: Computer Networks Security Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion Course 02: Cyber Security Incident Handling and Incident Response Cyber Security Incident Handling and Incident Response Section 01: An Introduction to Incident Handling Section 02: Preparation for an Incident Section 03: Identification Section 04: Containment Section 05: Eradication Section 06: Recovery Phase Section 07: Final Thoughts Course 03: CyberSecurity Law Online Course Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Module 05: Threats to Cyber Security by Criminals and Organised Crimes Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Module 07: Cyberterrorism Module 08: An Evolving Threat: The Deep Web Module 9: Fraud Module 10: Jurisdiction Course 04: Crash Course on Ecommerce Security Unit 01: Introduction and Types of Ecommerce Unit 02: Ecommerce SEO Unit 03: Ecommerce Demo Unit 04: Ecommerce Website Vulnerability and Security Risk Scanning Unit 05: Basic Terms of Ecommerce Unit 06: Ecommerce Fraud Unit 07: Ecommerce Fraud Prevention Course 05: Linux Security and Hardening Unit 01: Course Overview and Downloads Unit 02: General Security Unit 03: Physical Security Unit 04: Account Security Unit 05: Network Security Unit 06: File System Security Unit 07: Additional Resources Course 06: Secure Programming of Web Applications Section 01: Introduction Section 02: Well-known Vulnerabilities and Secure Programming Section 03: Conclusion and Summary Course 07: Complete Web Application Penetration Testing & Security Unit 01: Introduction Unit 02: BE PREPARED Unit 03: WEB APPLICATION TECHNOLOGIES Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS Unit 07: CROSS SITE REQUEST FORGERY - XSRF Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Unit 09: CLIENT SIDE SECURITY TESTING Unit 10: FILE RELATED VULNERABILITIES Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE Course 08: Data Protection and Data Security Level 2 GDPR Basics GDPR Explained Lawful Basis for Preparation Rights and Breaches Responsibilities and Obligations Course 09: Information Management Module 01: Introduction to Information Management Module 02: Information Management Strategy Module 03: Databases and Information Management Module 04: Management Information Systems (MIS) Module 05: Auditing Information Systems Module 06: Ethical and Social Issues and Data Protection Course 10: Security Management Advanced Diploma Module 01: Introduction to Security Management Module 02: Organisational Security Management Module 03: Security Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber Security and Fraud Prevention Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations Course 11: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics CPD 115 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this IT Security & Cyber Security bundle. Requirements Our IT Security & Cyber Security is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this IT Security & Cyber Security expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (IT: IT Security & Cyber Security) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT Security & Cyber Security
Delivered Online On Demand
£53

CompTIA PenTest+ (Ethical Hacking)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Website Hacking From Scratch

4.5(3)

By Studyhub UK

Embark on a riveting expedition into the realm of website security with our course, 'Website Hacking From Scratch.' Delve deep into the labyrinth of potential vulnerabilities, from SQL injections to XSS vulnerabilities, equipping yourself with the prowess to identify and safeguard against digital threats. By course end, learners are not only conversant with the anatomy of website vulnerabilities but are also adept at leveraging tools like Owasp ZAP for holistic website fortification. Learning Outcomes Gain comprehensive insights into the foundation of website vulnerabilities and their exploitation. Understand and identify risks associated with file uploads, code executions, and session management. Acquire proficiency in detecting and safeguarding against SQL and XSS vulnerabilities. Master the use of automated tools, such as Owasp ZAP, in vulnerability detection. Develop strategies for effective post-exploitation management. Why choose this Website Hacking From Scratch course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Website Hacking From Scratch Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Website Hacking From Scratch course for? Aspiring cybersecurity enthusiasts eager to delve into website security. Web developers keen to fortify their sites against potential breaches. IT professionals aiming to enhance their repertoire with security expertise. Entrepreneurs looking to ensure the robustness of their online platforms. Individuals curious about ethical hacking and its applications. Career path Ethical Hacker: £25,000 - £70,000 Penetration Tester: £30,000 - £60,000 Cybersecurity Analyst: £28,000 - £55,000 IT Security Consultant: £35,000 - £75,000 Web Security Manager: £40,000 - £80,000 Information Security Officer: £45,000 - £85,000 Prerequisites This Website Hacking From Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Website Hacking From Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Course Introduction Course Introduction 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:12:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Website Hacking From Scratch 00:00:00 Assignment Assignment - Website Hacking From Scratch 00:00:00

Website Hacking From Scratch
Delivered Online On Demand9 hours 23 minutes
£10.99