• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6829 Mobile courses

Essential LTE

5.0(3)

By Systems & Network Training

LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.

Essential LTE
Delivered in Internationally or OnlineFlexible Dates
£1,727

Mobile Phone Technique Masterclass M5

5.0(22)

By The Northern College Of Clinical Hypnotherapy

Throughout this masterclass, you will learn effective strategies for guiding clients in processing their memories, ultimately enabling them to feel empowered and free. This is an invaluable opportunity for mental health professionals looking to enhance their therapeutic skills and provide safe, effective support to those struggling with trauma.

Mobile Phone Technique Masterclass M5
Delivered Online On Demand1 hour
£25

Modern Web Design Diploma

4.3(43)

By John Academy

Description The Modern Web Design Diploma course teaches you to develop and design a responsive website that will work on every device covering mobile, tablet to extra large desktop monitor. The number of mobile users is enormous and increasing day by day. Therefore, it is a must to make your websites responsive. The old website owners spend a lot to make their site responsive; some go for redesigning and remaking their sites. Throughout the course, you will learn to create the responsive webpage using Balsamiq Mockups, Photoshop, Zeplin and Invision App. You will learn how to design for the developers. Topics covered in the course are the system of building Prototypes for showing website flows and interactions, designing Wireframes using Balsamiq Mockups, design and develop a coded Style Guide for Developers, creating Online Style Guide using Zeplin, creating grid system for different screens, e.g. PC, Tablet or Smart Phones. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Modern Web Design Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Modern Web Design Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction 0.1 promo-workflow 00:03:00 0.2 what we will cover in this course 00:03:00 Requirements to take this course 1.1 skills-and-apps-you-need-to-take-this-courseautogenerated 00:02:00 1.2. Photoshop extensions We Need 00:07:00 Organizing your Web Design Project 2.1.how To Organize A Design Project 00:05:00 2.2 client's Sketches 00:04:00 2.2 naming psd layers and groups 00:06:00 2.3.naming Conventions To Help Developers 00:03:00 Gathering project information from client 3.1.design Briefs 00:10:00 3.3 getting More Info On Project 00:05:00 3.4.content_template for gathering information 00:03:00 Sketching, Wireframing, Atomic Design & 8point Grid system 4.1.moodboards 00:06:00 4.2.ideation Phase 00:05:00 4.3.introduction To Balsamiq 00:10:00 4.4desining Wireframes Part 1 00:08:00 4.5.desining Wireframes Part 2 00:14:00 4.6.atomic Design 00:08:00 4.7.8pt Grid 00:09:00 Style Guides, colors and typographics scales 5.1.typeface And Color Combinations 00:04:00 5.2.ui Style Guides 00:08:00 5.3.examples Of Ui Style Guides 00:03:00 5.4.how I Created My Style Guide 00:07:00 5.5.styleguide-typescale Explained 00:03:00 5.6.Styleguide-assignment 00:01:00 Designing for Desktop/Large View (Wstudio Web Design Project) 6.1.online tools for grid calcuations 00:13:00 6.2.planning your grid 00:05:00 6.3.whitespace-plan 00:06:00 6.4.setting Up Artboard For Desktop Design 00:07:00 6.5.designing Header And Hero Part 1 00:12:00 6.6 designing Header And Hero Part 2 00:09:00 6.7.designing Steps Area Part 1 00:10:00 6.8.designing Step Area Part 2 00:09:00 6.9.userreviews Area Design 00:09:00 6.10.adjusting White Space And Vertical Rhythem 00:06:00 6.11.desining Team Part1 00:11:00 6.12.desining Team Part2 00:07:00 6.13.footer Design Part1 00:08:00 6.14.footer Design Part2 00:11:00 Planning Responsive Web Design 7.1.Responsive Design Considerations Part 1 00:07:00 7.2.Responsive Design Considerations Part 2 00:06:00 Designing for Tablet/Medium View (Wstudio Web Design Project) 7.3.Establishing Grid For Tablets 00:07:00 7.4.Header Area For Tablet View 00:11:00 7.5.Section how it work - steps 00:10:00 7.6.Section team Tablet View 00:09:00 7.7 footer Design 00:09:00 Designing for Mobile/Small View (Wstudio Web Design Project) 8.1.mobile Artboard And Grids 00:04:00 8.2.header Mobile View 00:11:00 8.3.steps Section-mobile 00:09:00 8.4.section 2 Team Members For Mobile 00:09:00 8.5.footer And Final Adjustments 00:08:00 Designing for Developers 9.1.what Developes Needs To Know 00:05:00 9.2.Red Line Document with Ink 1 00:10:00 9.3.Red Line Document with Ink 2 00:06:00 9.4.which layer styles you can use photoshop 00:08:00 9.5.installing Using Zeplin 00:10:00 9.6.style Guides With Zeplin 00:14:00 9.7.tools-zeplin-avocode-1 00:04:00 9.8.avocode And Sympli 00:06:00 Prototyping with Invision app 10.1. What Are Prototypes 00:04:00 10.2.getting Familiar With Invision App For Prototyping 00:07:00 10.3.creating First Prototype With Invision App 00:06:00 SVGs and Icon Fonts in Web Design 11.1 using iconmoon app to create custom icon fonts set 00:08:00 11.2 Using SVG in Web design 00:10:00 Assignment Assignment - Modern Web Design Diploma 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Modern Web Design Diploma
Delivered Online On Demand7 hours 38 minutes
£11.99

LTE optimisation and capability

5.0(3)

By Systems & Network Training

LTE optimization training course description This course gives delegates an understanding of the Key Performance Indicators used within the 3G LTE (4G) network environment. We investigate the 3GPP standards for KPIs (including TR 32.814, TS 32.410 & TS 32.455) these cover GERAN, UMTS & LTE environments. The course details the optimisation procedures and the use of Self optimisation, Selforganising & Self-healing equipment now being deployed across all releases of mobile networks. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE optimization training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE optimization training course contents Introduction to the cellular environment The architecture, 2G (GSM), GPRS/EDGE, The NGMN (Next Generation Mobile Network), media gateway controller, 3GPP Rel99 the 3G introduction, HSPA deployments, 3G LTE (4G). Cellular network procedures GSM/GPRS call setup, GPRS data call setup, 3G UMTS data call setup, Data call (Voice over LTE) in LTE (using IMS), Circuit Switched Fall Back (CSFB) in LTE, IP packet session in LTE. Introduction to the standards The 3GPP specifications body, The numbering structure for KPIs, 2G KPIs, 3G/UMTS KPIs, 3G LTE KPIs, IMS KPIs. Introduction to the KPI definitions KPI definitions, accessibility KPIs, retainability KPIs, mobility KPIs, utilisation KPIs. In-depth overview of the air Interfaces GSM/GPRS FDMA & TDMA solution, 3G UMTS WCDMA solution, HSPA+ sharing spare power (Codes), The 3G LTE uplink & downlink interface explained, Initial attach procedures explained. Problem analysis Reference Signal Received Power (RSRP), Signal to Interference Noise Ratio (SINR), handover success rates, power adjustments, classification of coverage problems, weak coverage & coverage holes, lack of dominant cells, cross coverage, improper tilt settings, uplink/downlink imbalance, signal quality, Azimuths & tilts to reduce interference, Handover failure due to interference, Service drop causes. Mobile RF performance in 2G/3G Performance counters, KPIs, testing & measurement, Drive testing and survey, Data collection and post processing of data, LTE service optimization, bandwidth, poor coverage, Quality, optimization process, KPI optimization, Root Cause Analysis (RCA) applied to RF issues, optimization tools and software. Advanced LTE network planning & optimization LTE UE measurements (RSRP/RSRQ), LTE capacity planning, RF configuration parameters, LTE cell selection/reselection planning, LTE radio network KPIs, LTE user-centric KPIs, LTE network performance KPIs, LTE system utilization KPIs, LTE RF channel performance predictions, LTE channel information processing, LTE channel multiplexing, Physical layer and structure, MIMO in LTE, LTE resource plan LTE and Self-Organizing Networks (SON). Radio network optimization work flow Work flow, the existing network, Optimization team establishment and cluster division, Single site verification, Alarm check, Cell state check, Radio parameters check, Site verification, Statistics analysis, Coverage problem analysis. Mobile internet and QoS issues Cellular QoS reference models. How QoS impact on KPIs and measurements, Introduction to mobile internet, The concept of shared access technologies, Support for QoS in the WCDMA environment, The PDP context model, Supporting end-to-end QoS, EPS bearer concepts, Default EPS bearer, Dedicated EPS bearer, APN-AMBR, UE-AMBR.

LTE optimisation and capability
Delivered in Internationally or OnlineFlexible Dates
£2,477

CompTIA A+ Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification. Overview Install and configure mobile devices Compare and contrast networking hardware Configure internet connections and wireless networking Troubleshoot hardware and networks Install motherboards, RAM, storage devices, CPUs and add-on cards Deploy and configure connected devices Summarize cloud-computing concepts and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry-recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end-point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues

CompTIA A+ Part 1
Delivered OnlineFlexible Dates
£2,475

Dart Application Codes

By Course Cloud

Course Overview Discover how to use the premier programming language, designed for client development and web and mobile apps, when you take this course on Dart Application Codes. Developed by Google, this versatile mobile-first platform has plenty of advantages that can be utilised for building apps for the two most popular handheld platforms (iOS and Android). With this training, you'll gain an acute understanding of the language and become capable of using Dart, running it fast and effectively on your chosen medium. This Programming Language training provides the total learning curve for using Dart and its myriad of functions. You'll learn the fundamental basics of the language, the practical usage of available functions, mastering Object Orientated Programming (OOP), working with asynchronous programming, and much more. This learning package contains the complete set of skills and knowledge needed to use Dart in computer development and excel in the programming industry for mobile and PC apps. This best selling Dart Application Codes has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Dart Application Codes is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Dart Application Codes is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Dart Application Codes is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Dart Application Codes, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Dart Application Codes will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Dart Application Codes to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email. 

Dart Application Codes
Delivered Online On Demand
£25

Introduction to Swift - Mobile App Development

By Nexus Human

Duration 3 Days 18 CPD hours Discover and explore how to use the fundamental building blocks of the Swift programming language. class will teach you the basic concepts of Swift programming, including syntax, logic, structures, functions, and patterns. It also includes detailed explanations of language syntax and coding exercises. Introduction to Swift Constants, Variables, and Data TypesOperatorsControl FlowStrings & FunctionsStructures & ClassesOptionalsCollectionsLoopsType CastingGuard StatementsScope & EnumerationsProtocolsClosuresExtensions

Introduction to Swift - Mobile App Development
Delivered OnlineFlexible Dates
Price on Enquiry

Iphone Tricks and App Development

4.3(43)

By John Academy

Description:  iPhone has continued to develop regarding functions and features through the continuous software and application development made possible by the developers. To be able to appreciate their well-developed apps and features, you need to learn the basic iPhone tricks and updated applications. Through this course, you will learn how iPhone app development is made and how you can be part of the team which helps in improving iPhone's applications, features, and functions. Who is the course for? App developers who are interested in checking and trying the features of an iPhone. iPhone owners who want to explore their phones and utilize it. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The iPhone Tricks and App Development course is a useful qualification to possess, and would be beneficial for the following careers: iPhone App Developer iOs Developer. Module 1: Iphone Tricks and Apps The Most Popular Productivity Applications For the Multi-Tasker 01:00:00 Augmented Reality on the iPhone 00:30:00 Funny iPhone tricks 00:30:00 Get Beer and Popcorn on your iPhone 00:15:00 Great iPhone tips 01:00:00 Handy iPhone Tricks and Applications to Have 01:00:00 How to Find Your Way Using iPhone GPS 01:00:00 How to Use TweetDeck on Your iPhone and Stay Connected 00:15:00 Impress your friends with these iPhone usage tips and applications 00:15:00 Interesting iPhone Applications for People to Try 01:00:00 Managing Your To Do List with an iPhone Application 00:30:00 Most Wanted Applications For The iPhone 00:15:00 Popular Tricks for Your IPhone 00:15:00 Teaching Your Kids with an iPhone Application 00:15:00 Using Your iPhone as a Flash Drive 00:30:00 Top 3 Games for iPhone Addicts 00:30:00 Top 3 Must Have Tricks For iPhone Survival 00:15:00 Top 3 Social Networking Applications for the Multi-tasker 01:00:00 Top 3 Tricks to Get The Most out Of Your iPhone 00:15:00 Truly Productive Real Estate Management with an iPhone Application 01:00:00 Using an iPhone Application to Remember Key Dates 00:15:00 Using an iPhone Application to Translate Your Way to Success 00:15:00 Using an iPhone Application to Make Your Run Work for You 01:00:00 Using the Weather Channel iPhone Application to Plan Your Day 00:30:00 Module 2: App Development and Marketing Introduction 00:15:00 Potential Opportunities for Earning 00:30:00 Brainstorming your App Ideas 01:00:00 Developing your App 01:00:00 Marketing your App 01:00:00 Leveraging the App Market 01:00:00 Other Ways to Generate Income with Apps 01:00:00 Conclusion 00:15:00 Resources 00:30:00 Additional Supporting Materials iOS Development 00:00:00 iOS 10 App Essentials 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Iphone Tricks and App Development
Delivered Online On Demand20 hours
£25

Essential IMS

5.0(3)

By Systems & Network Training

Essential IMS training course description The IP Multimedia Core Network Subsystem (IMS) is defined by 3GPP as a new mobile infrastructure. This course studies the discreet elements in the IMS. What will you learn Describe the IMS. Describe the IMS architecture. Explain how charging, security and QoS is handled in the IMS. Explain how the IMS supports service enablers such as Push to talk and Presence. Essential IMS training course details Who will benefit: Telecommunications staff. Prerequisites: Mobile communications overview Duration 2 days Essential IMS training course contents Mobile communications review The role of IP in telecommunications. GSM to IMS. Enhanced multimedia services, Push To, convergence, conferencing, roaming. What is IMS? What it is, why IMS, standard bodies: 3GPP, IETF, OMA, IMS services. MMD comparison. IMS architecture blocks Overview, IMS functions, IMS interfaces, IMS protocols, IMS elements, IMS reference points. Access network, IMS in GSM, CDMA, WiFi & PSTN networks. Core network. Application, Control and Call planes. HSS - User database Identification. The user database, role of HSS, SLF and multiple HSSs. 'Normal' identities, IMPI, IMPU. IMS signalling: SIP What is SIP? SIP URI, contact address, UAs, Proxies, basic SIP call flow, SIP sessions. IMS other protocols Megaco, Diameter, XML, XCAP, COPS, RTP/RTCP, SDP, H.324M, IM and MSRP. Call/Session Control Call Session Control Functions (CSCF). Domains. Home networks, visited networks. CSCF and SIP. P-CSCF, P-CSCF discovery, P-CSCF functions. I-CSCF, DNS and I-CSCF. S-CSCF, S-CSCF functions, ENUM lookups. QoS. Example call flows. IMS services Open service platform, Application Servers, profiles, AS interface with S-CSCF. 'Normal' services (Caller ID, Call waiting, transfer…) Push to talk Over Cellular (PoC), IMS conferencing, Group management, IMS Presence, IMS Messaging. Other possible applications. Media servers. (MRFC, MRFP). Gateways IMS PSTN procedures, BGCF, PSTN interface. SGW, MGCF, MGW Charging Architecture, Offline, online and flow based charging, charging reference points, CCF, DIAMETER, ICID, IOI. IMS security IMS security architecture, identities, AAA, public and private user ID, service filters, Cx interface, RADIUS, Diameter protocol, 3GPP AKA, integrity, privacy, NDS, IPSEC, trust, assertion.

Essential IMS
Delivered in Internationally or OnlineFlexible Dates
£2,477

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495