• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1416 Network & Security courses in Giffnock delivered Online

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system. This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: AFM Overview AFM Overview AFM Availability AFM and the BIG-IP Security Menu Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Module 3: Network Firewall AFM Firewalls Contexts Modes Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Configuring Network Firewall Network Firewall Rules and Policies Network Firewall Rule Creation Identifying Traffic by Region with Geolocation Identifying Redundant and Conflicting Rules Identifying Stale Rules Prebuilding Firewall Rules with Lists and Schedules Rule Lists Address Lists Port Lists Schedules Network Firewall Policies Policy Status and Management Other Rule Actions Redirecting Traffic with Send to Virtual Checking Rule Processing with Packet Tester Examining Connections with Flow Inspector Module 4: Logs Event Logs Logging Profiles Limiting Log Messages with Log Throttling Enabling Logging in Firewall Rules BIG-IP Logging Mechanisms Log Publisher Log Destination Filtering Logs with the Custom Search Facility Logging Global Rule Events Log Configuration Changes QKView and Log Files SNMP MIB SNMP Traps Module 5: IP Intelligence Overview Feature 1 Dynamic White and Black Lists Black List Categories Feed Lists IP Intelligence Policies IP Intelligence Log Profile IP Intelligence Reporting Troubleshooting IP Intelligence Lists Feature 2 IP Intelligence Database Licensing Installation Configuration Troubleshooting IP Intelligence iRule Module 6: DoS Protection Denial of Service and DoS Protection Overview Device DoS Protection Configuring Device DoS Protection Variant 1 DoS Vectors Variant 2 DoS Vectors Automatic Threshold Configuration Variant 3 DoS Vectors Device DoS Profiles DoS Protection Profile Dynamic Signatures Dynamic Signatures Configuration DoS iRules Module 7: Reports AFM Reporting Facilities Overview Examining the Status of Particular AFM Features Exporting the Data Managing the Reporting Settings Scheduling Reports Examining AFM Status at High Level Mini Reporting Windows (Widgets) Building Custom Widgets Deleting and Restoring Widgets Dashboards Module 8: DoS White Lists Bypassing DoS Checks with White Lists Configuring DoS White Lists tmsh options Per Profile Whitelist Address List Module 9: DoS Sweep Flood Protection Isolating Bad Clients with Sweep Flood Configuring Sweep Flood Module 10: IP Intelligence Shun Overview Manual Configuration Dynamic Configuration IP Intelligence Policy tmsh options Extending the Shun Feature Route this Traffic to Nowhere - Remotely Triggered Black Hole Route this Traffic for Further Processing - Scrubber Module 11: DNS Firewall Filtering DNS Traffic with DNS Firewall Configuring DNS Firewall DNS Query Types DNS Opcode Types Logging DNS Firewall Events Troubleshooting Module 12: DNS DoS Overview DNS DoS Configuring DNS DoS DoS Protection Profile Device DoS and DNS Module 13: SIP DoS Session Initiation Protocol (SIP) Transactions and Dialogs SIP DoS Configuration DoS Protection Profile Device DoS and SIP Module 14: Port Misuse Overview Port Misuse and Service Policies Building a Port Misuse Policy Attaching a Service Policy Creating a Log Profile Module 15: Network Firewall iRules Overview iRule Events Configuration When to use iRules More Information Module 16: Recap BIG-IP Architecture and Traffic Flow AFM Packet Processing Overview

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Cloud Infrastructure Engineer with CompTIA & Cyber Security- 30 CPD Certified Courses!

By NextGen Learning

Get ready for an exceptional online learning experience with the Cloud Infrastructure Engineer with CompTIA & Cyber Securitybundle! This carefully curated collection of 30 premium courses is designed to cater to a variety of interests and disciplines. Dive into a sea of knowledge and skills, tailoring your learning journey to suit your unique aspirations. The Cloud Infrastructure Engineer with CompTIA & Cyber Security is a dynamic package, blending the expertise of industry professionals with the flexibility of digital learning. It offers the perfect balance of foundational understanding and advanced insights. Whether you're looking to break into a new field or deepen your existing knowledge, the Cloud Infrastructure Engineer with CompTIA & Cyber Security package has something for everyone. As part of the Cloud Infrastructure Engineer with CompTIA & Cyber Security package, you will receive complimentary PDF certificates for all courses in this bundle at no extra cost. Equip yourself with the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle to confidently navigate your career path or personal development journey. Enrol today and start your career growth! This Bundle Comprises the Following Cloud Infrastructure Engineer with CompTIA & Cyber SecurityCPD Accredited Courses: Course 01: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 02: Exam Prep: AWS Certified Solutions Architect Associate 2021 Course 03: Data Center Training Essentials: General Introduction Course 04: Data Center Training Essentials: Mechanical & Cooling Course 05: Internet of Things Course 06: Web Application Penetration Testing Course Course 07: Google Cloud for Beginners Course 08: MySQL Database Development Mastery Course 09: Microsoft Azure Cloud Concepts Course 10: Azure Machine Learning Course 11: Cyber Security Incident Handling and Incident Response Course 12: IT Administration and Networking Course 13: CompTIA Network+ Certification (N10-007) Course 14: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 15: Learn Ethical Hacking From A-Z: Beginner To Expert Course 16: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 17: CISRM - Certified Information Systems Risk Manager Course 18: Quick Data Science Approach from Scratch Course 19: Project on Deep Learning - Artificial Neural Network Course 20: Deep Learning Neural Network with R Course 21: Cyber Security Awareness Training Course 22: CompTIA A+ (220-1001) Course 23: Computer Networks Security from Scratch to Advanced Course 24: Career Development Plan Fundamentals Course 25: CV Writing and Job Searching Course 26: Learn to Level Up Your Leadership Course 27: Networking Skills for Personal Success Course 28: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 29: Decision Making and Critical Thinking Course 30: Time Management Training - Online Course What will make you stand out? Upon completion of this online Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle, you will gain the following: CPD QS Accredited Proficiency with this Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle After successfully completing the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle, you will receive a FREE CPD PDF Certificates as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle The online test with immediate results You can study and complete the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle at your own pace. Study for the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle using any internet-connected device, such as a computer, tablet, or mobile device. Each course in this Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This bundle promises not just education but an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Embrace the future of learning with the Cloud Infrastructure Engineer with CompTIA & Cyber Security, a rich anthology of 30 diverse courses. Each course in the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle is handpicked by our experts to ensure a wide spectrum of learning opportunities. ThisCloud Infrastructure Engineer with CompTIA & Cyber Security bundle will take you on a unique and enriching educational journey. The bundle encapsulates our mission to provide quality, accessible education for all. Whether you are just starting your career, looking to switch industries, or hoping to enhance your professional skill set, the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle offers you the flexibility and convenience to learn at your own pace. Make the Cloud Infrastructure Engineer with CompTIA & Cyber Security package your trusted companion in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle is perfect for: Lifelong learners looking to expand their knowledge and skills. Professionals seeking to enhance their career with CPD certification. Individuals wanting to explore new fields and disciplines. Anyone who values flexible, self-paced learning from the comfort of home. Requirements You are cordially invited to enroll in this bundle; please note that there are no formal prerequisites or qualifications required. We've designed this curriculum to be accessible to all, irrespective of prior experience or educational background. Career path Unleash your potential with the Cloud Infrastructure Engineer with CompTIA & Cyber Security bundle. Acquire versatile skills across multiple fields, foster problem-solving abilities, and stay ahead of industry trends. Ideal for those seeking career advancement, a new professional path, or personal growth. Embrace the journey with the CompTIA & Cyber Securitybundle package. Certificates CPD Quality Standard Certificate Digital certificate - Included 30 CPD Quality Standard Certificates - Free

Cloud Infrastructure Engineer with CompTIA &  Cyber Security- 30 CPD Certified Courses!
Delivered Online On Demand5 days
£199

Close protection & Security Management Course

5.0(2)

By Training Express

Ever wondered who watches over VIPs or keeps high-risk zones secure behind the scenes? This Close Protection & Security Management Course dives into the techniques and strategies used to maintain order, manage threats, and coordinate safety in complex environments. It doesn’t involve movie-style action or dramatic chase scenes—but it does equip learners with knowledge in risk assessment, security planning, surveillance, and incident response, all delivered online with zero need to show up in a black suit and earpiece. Whether you're looking to sharpen your understanding of close protection operations or want to explore how modern security teams plan for emergencies, this course brings you a structured, easy-to-follow learning path. From handling threat intelligence to managing large-scale security operations, it blends straightforward theory with up-to-date insights into the industry. If the idea of structure, discretion, and safety appeals more than drama and stunts, then you’re in the right place—no sunglasses at night required. Key Features of this Course : Instant e-certificate and hard copy dispatch by next working day Fully online, interactive course with audio voiceover Developed by professionals in the field Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases *** Additional Gifts *** Free Life coaching Course *** (Offer Ends Soon) *** Course Curriculum of Close Protection The detailed curriculum outline of our course is as follows: Module 01: Introduction to Close Protection Module 02: The Close Protection Team Module 03: The Planning Module 04: Threat Assessment Module 05: Vehicle Drills: Embus and Debus Module 06: Route Selection and Reconnaissance Module 07: Legislation Regarding Close Protection Course Curriculum of Risk and Security Management The detailed curriculum outline of our course is as follows: Module 01: Introduction to Risk Management Module 02: Risk and Types of Risk Module 03: Risk Management Process Module 04: Organisational Security Management Module 05: Security Risk Analysis and Risk Reduction Module 06: Physical and Information Security Protection Module 07: Cyber Security and Fraud Prevention Module 08: Security Investigations and Threat Awareness Module 09: Laws and Regulations Life Coaching Module 01: Life Coaching: The Purpose and Fundamentals Module 02: Develop Your Self-Awareness Module 03: The Development of Core Beliefs and Managing Fears Module 04: Life Coaching Types and Key Attributes of a Life Coach Module 05: Understanding Emotional Intelligence Module 06: Body Language and Communication Techniques Module 07: A Structure for Client Work and Goal Setting Module 08: Basic Principles for Business Development and Growth Module 09: The Ethical Coach: Protect Yourself and Your Clients Learning Outcomes: Understand principles of close protection and risk management. Analyze threats and devise strategic security plans effectively. Demonstrate proficiency in physical and cyber security measures. Comprehend relevant legislation and regulatory frameworks. Apply organisational security management strategies adeptly. Conduct security investigations and maintain threat awareness. Accreditation All of our courses, including this course, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed your course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we do recommend that you renew them every 12 months. Assessment At the end of the course, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven't, there's no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself. CPD 20 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone with a knack for learning new skills can take this course. While this comprehensive training is popular for preparing people for job opportunities in the relevant fields, it also helps to advance your career for promotions. Individuals aspiring to work in security management roles. Security professionals seeking to enhance their skills. Law enforcement personnel transitioning to private security. Graduates looking to enter the security industry. Career changers interested in high-stakes security roles. Career path Security Manager - £30K to 50K/year. Risk Analyst - £25K to 45K/year. Close Protection Officer - £25K to 40K/year. Cyber Security Specialist - £35K to 60K/year. Security Consultant - £35K to 70K/year. Certificates Certificate of completion Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Certificate of completion Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Close protection & Security Management Course
Delivered Online On Demand1 hour
£15

Cyber Security Law at QLS Level 7

4.7(47)

By Academy for Health and Fitness

24 Hours Left! Don't Let Year-End Deals Slip Away - Enrol Now! This Advanced Diploma in Cyber Security Law at QLS Level 7 course is endorsed by The Quality Licence Scheme and accredited by CPDQS (with 180 CPD points) to make your skill development & career progression more accessible than ever! Are you looking to improve your current abilities or make a career move? If yes, our unique Cyber Security Law at QLS Level 7 course might help you get there! It is an expertly designed course which ensures you learn everything about the topic thoroughly. Expand your expertise with high-quality training from the Cyber Security Law at QLS Level 7 course. Due to Cyber Security Law at QLS Level 7's massive demand in the competitive market, you can use our comprehensive course as a weapon to strengthen your knowledge and boost your career development. Learn Cyber Security Law at QLS Level 7 from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career. The Cyber Security Law at QLS Level 7 course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the Cyber Security Law at QLS Level 7 course, an instant e-certificate will be exhibited in your profile that you can order as proof of your skills and knowledge. Add these amazing new skills to your resume and boost your employability by simply enrolling in this Cyber Security Law at QLS Level 7 course. This Cyber Security Law at QLS Level 7 training can help you to accomplish your ambitions and prepare you for a meaningful career. So, join us today and gear up for excellence! Why Prefer This Cyber Security Law at QLS Level 7 Course? Opportunity to earn a certificate endorsed by the Quality Licence Scheme & another accredited by CPDQS which is completely free. Get a free student ID card! (£10 postal charge will be applicable for international delivery) Innovative and engaging content. Free assessments 24/7 tutor support. Take a step toward a brighter future! *** Course Curriculum *** Here is the curriculum breakdown of the Cyber Security Law at QLS Level 7 course: Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Module 05: Threats to Cyber Security by Criminals and Organised Crimes Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Module 07: Cyberterrorism Module 08: An Evolving Threat: The Deep Web Module 09: Fraud Module 10: Jurisdiction Assessment Process You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you have completed all of the Advanced Diploma in Cyber Security Law at QLS Level 7 exams. CPD 180 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Law at QLS Level 7 course is perfect for highly motivated people who want to improve their technical skills and prepare for the career they want! Requirements No prior background or expertise is required. Career path The Cyber Security Law at QLS Level 7 course will boost your CV and aims to help you get the job or even the long-awaited promotion of your dreams. Certificates Advanced Diploma in Cyber Security Law at QLS Level 7 Hard copy certificate - Included CPD Accredited Certificate Digital certificate - Included Upon successfully completing the Bundle, you will need to place an order to receive a PDF Certificate for each course within the bundle. These certificates serve as proof of your newly acquired skills, accredited by CPD QS. Also, the certificates are recognised throughout the UK and internationally. CPD Accredited Certificate Hard copy certificate - Included International students are subject to a £10 delivery fee for their orders, based on their location.

Cyber Security Law at QLS Level 7
Delivered Online On Demand4 weeks
£110

The Complete Ethical Hacking Course!

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

The Complete Ethical Hacking Course!
Delivered Online On Demand18 hours 11 minutes
£25

Learn Ethical Hacking From A-Z: Beginner To Expert

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£12

BlackArch Linux for Hacking and Penetration Testing

4.7(160)

By Janets

Register on the BlackArch Linux for Hacking and Penetration Testing today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The BlackArch Linux for Hacking and Penetration Testing is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The BlackArch Linux for Hacking and Penetration Testing Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the BlackArch Linux for Hacking and Penetration Testing, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content BlackArch Linux for Hacking and Penetration Testing Module 01: Kali Linux Installation and Updates 00:31:00 Module 02: Kali Linux Operating System Configuration 00:32:00 Module 03: Virtualization Basics 00:18:00 Module 04: BlackArch Linux Introduction and Installation 00:43:00 Module 05: BlackArch Configuration 00:33:00 Module 06: Information Gathering and Validation 00:33:00 Module 07: Gathering Information with Maltego 00:15:00 Module 08: Cherrytree for Information Database Storage 00:08:00 Module 09: NMAP Techniques for Information Gathering 00:24:00 Module 10: Dracnmap Scripts for BlackArch 00:09:00 Module 11: Android Hacking with BlackArch 00:24:00 Module 12: Windows 7 Hacking with BlackArch 00:21:00 Module 13: Netcat NC Network Hacking with BlackArch 00:14:00 Module 14: Web Application and Website Hacking with BlackArch 00:26:00 Module 15: BEEF, Browser Injections, and Other Browser Attacks 00:25:00 Module 16: Hacking Facebook with BlackArch 00:12:00 Module 17: Hacking Wireless Networks with BlackArch Tools 00:29:00 Module 18: Man in the Middle Attacks with BlackArch 00:20:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

BlackArch Linux for Hacking and Penetration Testing
Delivered Online On Demand6 hours 57 minutes
£25

Ethical Hacking with Kali Linux

4.7(160)

By Janets

Description Register on the Ethical Hacking with Kali Linux today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Ethical Hacking with Kali Linux course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post.  Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.

Ethical Hacking with Kali Linux
Delivered Online On Demand28 hours
£25

Ethical Hacking

4.7(160)

By Janets

Register on the Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Introduction Course Overview 00:04:00 Module 02: Virtual Lab Environment Create a Virtual Install of Kali Linux Using VirtualBox 00:11:00 Module 03: EVM: 1 Lab preparation 00:03:00 Scanning and Enumeration 00:15:00 Exploitation and Privilege Escalation 00:10:00 Module 04: INFOSEC: Prep OSCP Lab file 01:15:00 Video - Lab Setup 00:04:00 Video - Walkthrough - CTF INFOSEC: Prep OSCP 00:18:00 Module 05: CTF - SQL Injection to Shell Walkthrough Lab Preparation 00:05:00 CTF Walkthrough - SQL Injection to Shell 00:13:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Ethical Hacking
Delivered Online On Demand2 hours 38 minutes
£25

Palo Alto Networks : Strata Foundations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Strata Foundations
Delivered OnlineFlexible Dates
Price on Enquiry