• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

611 Linux courses

Ethical Hacking from Scratch

5.0(1)

By LearnDrive UK

We will help you become an ethical hacker in this course.

Ethical Hacking from Scratch
Delivered Online On Demand1 hour
£5

Pentest Programmer- QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for Pentest Programmer | 10 Endorsed Certificates Included | Life Time Access

Pentest Programmer- QLS Endorsed Bundle
Delivered Online On Demand
£599

Red Hat Virtualization with RHCVA Exam (RH319)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. Migrate virtual machines Migrate and control automatic migration of virtual machines. Manage virtual machine images Manage virtual machine snapshots and disk images. Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.

Red Hat Virtualization with RHCVA Exam (RH319)
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security Fundamentals and Best Practices

5.0(10)

By Apex Learning

20-in-1 Cyber Security Bundle Give a compliment to your career and take it to the next level. This Cyber Security bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop Cyber Security skills for your next job or elevate your skills for your next promotion, this Cyber Security bundle will help you stay ahead of the pack. Throughout the Cyber Security programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Cyber Security course, you will get 19 premium courses, an original hardcopy, 20 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Cyber Security Bundle Consists of the following Premium courses: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Computer Networks Security Course 03: Cyber Security Law Online Course Course 04: Cyber Intelligence Officer Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 07: Computer Hacking Forensic Investigator Course 08: Security Management Advanced Diploma Course 09: IT Administration and Networking Course 10: GDPR Training Course 11: Master JavaScript with Data Visualization Course 12: Computer Science With Python Course 13: R Programming for Data Science Course 14: WordPress Security Mastery Course 15: Mile2 Certified Network Forensics Examiner (CNFE) Course 16: Complete Web Application Penetration Testing & Security Course 17: Linux Security and Hardening Course 18: Excel Must know Formulas and Functions Course 19: Certified Information Systems Security Professional (CISSP) Course 20: Excel Spreadsheet for Beginner Enrol now in Cyber Security to advance your career, and use the premium study materials from Apex Learning. The Cyber Security bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Cyber Security expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn Cyber Security from any place in your own time without travelling for classes. Certificate: PDF Certificate: Free (Previously it was £6*20 = £120) Hard Copy Certificate: Free (For The Cyber Security Incident Handling and Incident Response Course: Previously it was £10) CPD 285 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Cyber Security bundle. Requirements This Cyber Security course has been designed to be fully compatible with tablets and smartphones. Career path Having this expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course Cyber Security Incident Handling and Incident Response absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Cyber Security Fundamentals and Best Practices
Delivered Online On Demand
£100

Symantec Endpoint Protection 12.X - Manage And Administer

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Endpoint Protection 12.X - Manage And Administer
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Computer Networks Security: CompTIA Network+ Certification - CPD Certified

4.8(9)

By Skill Up

CPD Certified Diploma | 17-in-1 Premium Bundle | +Gifts: 17 Free PDF+ Transcript Certificate | 24/7 Learner Support

Computer Networks Security: CompTIA Network+ Certification - CPD Certified
Delivered Online On Demand6 days
£100

Mile2 Certified Penetration Testing Consultant (CPTC)

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

Mile2 Certified Penetration Testing Consultant (CPTC)
Delivered Online On Demand1 hour
£12

Docker Ecosystem from Scratch

4.8(9)

By Skill Up

Enhance your productivity and add value to your work by learning Docker Ecosystem! Organize your virtual activities by

Docker Ecosystem from Scratch
Delivered Online On Demand12 hours 5 minutes
£25

Teach Yourself IT - CPD Accredited

4.5(3)

By Studyhub UK

Do you want to prepare for your dream job but strive hard to find the right courses? Then, stop worrying, for our strategically modified Teach Yourself IT bundle will keep you up to date with the relevant knowledge and most recent matters of this emerging field. So, invest your money and effort in our 30 course mega bundle that will exceed your expectations within your budget. The Teach Yourself IT related fields are thriving across the UK, and recruiters are hiring the most knowledgeable and proficient candidates. It's a demanding field with magnitudes of lucrative choices. If you need more guidance to specialise in this area and need help knowing where to start, then StudyHub proposes a preparatory bundle. This comprehensive Teach Yourself IT bundle will help you build a solid foundation to become a proficient worker in the sector. This Teach Yourself IT Bundle consists of the following 25 CPD Accredited Premium courses - Course 1: Network Security and Risk Management Course 2: CompTIA Network Course 3: Information Management Course 4: Web Application Penetration Testing Course Course 5: CompTIA Cloud+ (CV0-002) Course 6: Learn Ethical Hacking with Kali Linux Course 7: Computer Operating System and Troubleshooting Course 8: Building Your Own Computer Course Course 9: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 10: SQL Database Administrator Course 11: MS Word Essentials - The Complete Word Course - Level 3 Course 12: Data Protection (GDPR) Practitioner Course 13: Website Hacking From Scratch Course 14: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 15: Data Science and Visualisation with Machine Learning Course 16: SQL For Data Analytics & Database Development Course 17: PLC Programming Diploma Course 18: Cisco ASA Firewall Training Course Course 19: Create Your First Responsive Website Course 20: C# (C-Sharp) Course 21: Web Design (HTML, CSS, Bootstrap) Complete Course Course 22: Python Course Course 23: JavaScript Course 24: Net MVC and Entity Framework Course Course 25: Learn Spring & Angular Material with a Full Web Application 5 Extraordinary Career Oriented courses that will assist you in reimagining your thriving techniques- Course 1: Career Development Plan Fundamentals Course 2: CV Writing and Job Searching Course 3: Interview Skills: Ace the Interview Course 4: Video Job Interview for Job Seekers Course 5: Create a Professional LinkedIn Profile Learning Outcome This tailor-made Teach Yourself IT bundle will allow you to- Uncover your skills and aptitudes to break new ground in the related fields Deep dive into the fundamental knowledge Acquire some hard and soft skills in this area Gain some transferable skills to elevate your performance Maintain good report with your clients and staff Gain necessary office skills and be tech savvy utilising relevant software Keep records of your work and make a report Know the regulations around this area Reinforce your career with specific knowledge of this field Know your legal and ethical responsibility as a professional in the related field This Teach Yourself IT Bundle resources were created with the help of industry experts, and all subject-related information is kept updated on a regular basis to avoid learners from falling behind on the latest developments. Certification After studying the complete Teach Yourself IT training materials, you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of •8. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Ambitious learners who want to strengthen their CV for their desired job should take advantage of the Teach Yourself IT bundle! This bundle is also ideal for professionals looking for career advancement. Requirements To participate in this course, all you need is - A smart device A secure internet connection And a keen interest in Teach Yourself IT Career path Upon completing this essential Bundle, you will discover a new world of endless possibilities. These courses will help you to get a cut above the rest and allow you to be more efficient in the relevant fields.

Teach Yourself IT - CPD Accredited
Delivered Online On Demand7 days
£259