• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1426 Network & Security courses in Thatcham delivered Online

Diploma in IT Communications

4.3(43)

By John Academy

Description: When it comes to understanding the fundamentals of computer networking the individual should have the appropriate knowledge of how to connect several different elements to create ideal computing networking. This course will teach how to function in a wide range of areas within the ICT industry and in ICT support roles in other industries. You will learn about local and wide area networks, voice network and wireless data network installation and maintenance. This course will also teach you the key operational and technical aspects of computer communication systems and relevant security issues, enabling you to appreciate emerging technologies. If you are a non-techie interested in learning about computer networks or aspiring IT professional who wishes to better understand how networks work, then get all the information you need here. This course has been designed to equip students with a wide range of software, technical and ICT skills required by industry at the diploma level. By the end of this program, the students will have the ability to develop an IT solution to a practical business problem using a technological approach. Who is the course for? Non-Techies interested in Learning About Computer Networks. Business & IT Managers Need to better understand how network works. Aspiring & Inexperienced IT Professionals. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: Diploma in IT Communications is a useful qualification to possess and would be beneficial for the following careers: Entry level technician at Telephone/Internet Service Providers Computer sales and service technician Entry-level IT/ network technician at banks Entry-level IT/ network support technician at insurance companies Entry-level IT/ network support technician at utility companies Entry-level IT/ network support technician at energy based companies Entry-level IT/ network technician at universities Entry-level IT/ network technician at broadcast houses Entry-level IT/ network technician in the government Owner/Manager small computer business. Module 1: Basics of Data Communications Basics of the Information Technology 01:00:00 INTRODUCTION 00:15:00 OBJECTIVES 00:15:00 DATA COMMUNICATION 00:30:00 COMMUNICATION MEDIA 00:30:00 TYPES OF COMMUNICATION SERVICES 00:30:00 MODEM 00:30:00 COMPUTER NETWORK 00:30:00 BENEFITS OF NETWORK 00:15:00 TYPES OF NETWORK 00:30:00 IMPORTANT TERMS USED IN NETWORKING 00:30:00 TELECONFERENCING 00:30:00 Module 2: Computer Networking Basics Introduction to Computer Networking 00:30:00 Types of Computer Networks 01:00:00 Types of Network Equipment 00:30:00 Ethernet 00:30:00 Wireless Local Area Networking 01:00:00 Internet Service 01:00:00 TCP/IP and Other Internet Protocols 01:00:00 Network Routing, Switching and Bridging 01:00:00 IPv4 & IPv6 01:00:00 Module 3: Networking Basics of Computer Networking 00:30:00 Computer Networking Design and Solutions 00:30:00 Getting the Right Computer Network Hardware 00:30:00 Setting Up Your Computer Network 00:30:00 Wireless vs Wired 00:30:00 Cable Management for Wired Computer Network 01:00:00 Managing Your Network With Network Monitoring Tools 00:30:00 Computer Network Maintenance and Repair 00:30:00 Troubleshooting Computer Network Wrapping Up 01:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Diploma in IT Communications 00:20:00 Final Exam Final Exam- Diploma in IT Communications 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Diploma in IT Communications
Delivered Online On Demand19 hours 25 minutes
£11.99

Digital Forensic Science: Unraveling Cybercrime Mysteries Course

4.5(3)

By Studyhub UK

Dive into the captivating world of 'Digital Forensic Science: Unraveling Cybercrime Mysteries Course' and unearth the secrets of tracing cyber malefactors. This comprehensive curriculum encompasses every facet of digital investigation, from the basics of digital forensics to the intricacies of evidence management. Venture further to grasp the nuances of file system analysis, understand network and memory forensics, and master the art of presenting digital evidence seamlessly in the courtroom. Learning Outcomes Comprehend the foundational principles of digital forensics and its pivotal role in cyber investigations. Analyse digital platforms methodically to uncover vital traces left behind by cyber malefactors. Implement stringent evidence management protocols, ensuring the integrity and reliability of gathered digital proofs. Develop strategies to locate and apprehend cyber offenders, ensuring legal processes remain uncompromised. Present cogent digital evidence in legal settings, upholding the credibility and persuasiveness of the investigative findings. Why buy this Digital Forensic Science: Unraveling Cybercrime Mysteries Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success Who is this Digital Forensic Science: Unraveling Cybercrime Mysteries Course for? Individuals keen on embarking on a journey in the digital forensic domain. Law enforcement personnel aiming to bolster their cyber investigation skills. Legal professionals desiring enhanced knowledge on digital evidence presentation. IT enthusiasts curious about the intersections of technology, law, and crime. Anyone aspiring to safeguard digital realms and combat cybercrime proactively. Career path Digital Forensic Analyst: £45,000 - £60,000 Evidence Management Specialist: £40,000 - £55,000 Cybercrime Investigator: £50,000 - £70,000 Network Forensic Expert: £48,000 - £65,000 Memory Forensic Specialist: £47,000 - £62,000 Courtroom Digital Evidence Presenter: £42,000 - £58,000 Prerequisites This Digital Forensic Science: Unraveling Cybercrime Mysteries Course does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 1: Introduction to Digital Forensics Introduction to Digital Forensics 00:14:00 Module 2: Digital Forensic Investigation Digital Forensic Investigation 00:16:00 Module 3: Evidence Management Evidence Management 00:17:00 Module 4: Apprehending Offenders Apprehending Offenders 00:15:00 Module 5: Maintain Evidence-Based Reporting Maintain Evidence-Based Reporting 00:13:00 Module 6: File System Analysis Part-1 File System Analysis Part-1 00:11:00 Module 7: File System Analysis Part-2 File System Analysis Part-2 00:15:00 Module 8: Network Forensics Network Forensics 00:19:00 Module 9: Memory Forensics Memory Forensics 00:10:00 Module 10: Digital Evidence in the Courtroom Digital Evidence in the Courtroom 00:17:00

Digital Forensic Science: Unraveling Cybercrime Mysteries Course
Delivered Online On Demand2 hours 27 minutes
£10.99

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

4.9(27)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

Cyber Security Incident Handling and Incident Response

4.9(27)

By Apex Learning

Overview This comprehensive course on Cyber Security Incident Handling and Incident Response will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cyber Security Incident Handling and Incident Response comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cyber Security Incident Handling and Incident Response. It is available to all students, of all academic backgrounds. Requirements Our Cyber Security Incident Handling and Incident Response is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 13 lectures • 01:04:00 total length •Promo: 00:05:00 •1.1 Incident Handling: 00:07:00 •2.1 Preparation of People and Policy: 00:07:00 •2.2 Team Building and Management: 00:06:00 •3.1 Where Does Identification Occur?: 00:06:00 •3.2 What to Check?: 00:07:00 •4.1 Deployment and Categorisation: 00:05:00 •4.2 Short-term and Long-term Actions: 00:05:00 •5.1 Restoring and Improving Defenses: 00:05:00 •6.1 Validation and Monitoring: 00:06:00 •7.1 Meet, Fix, and Share: 00:05:00 •Resources - Cyber Security Incident Handling and Incident Response: 00:00:00 •Assignment - Cyber Security Incident Handling and Incident Response: 00:00:00

Cyber Security Incident Handling and Incident Response
Delivered Online On Demand1 hour 4 minutes
£12

CyberSecurity Law Online Course

4.9(27)

By Apex Learning

Course Overview: Cybersecurity is a rapidly growing field, and the demand for qualified cybersecurity professionals is only going to increase in the years to come. This Cybersecurity Law Online Course is designed to provide you with a comprehensive understanding of cyber law and cybersecurity ethics. The course is divided into 8 modules that cover topics such as cybersecurity and trust in cyberspace, threat factors computers as a target, threats to cybersecurity by criminals and organised crimes, threats to cybersecurity by hacktivists and nation-states, cyberterrorism, an evolving threat to the deep web, and fraud. According to recent reports, the demand for cybersecurity experts in the UK has surged by over 160% in the past year alone. This presents a golden opportunity for individuals with a passion for technology and a desire to protect against cyber threats. Enrol today and start your journey to a rewarding career in cybersecurity law. Key Features of the Course: CPD certificate upon completion 24/7 Learning Assistance for uninterrupted progress Engaging and interesting learning materials Expertly designed curriculum focusing on vital cyber law concepts Who is This Course For? This CyberSecurity Law Online Course is ideal for individuals who are passionate about the intersection of law and technology. It is specifically tailored for legal professionals, IT specialists, compliance officers, business owners, and anyone seeking to enhance their understanding of cyber law and its implications. What You Will Learn: In this comprehensive CyberSecurity Law Online Course, you will gain in-depth knowledge about various aspects of Cybersecurity Law. From exploring cyber ethics and online gambling to understanding the threats posed by criminals, hacktivists, and nation-states, you will delve into the intricacies of cyberterrorism and the hidden world of the deep web. Furthermore, you will examine fraud-related issues and develop a comprehensive understanding of the legal landscape surrounding cyber security. Why Enrol in This Course: Firstly, it is a top-reviewed CyberSecurity Law Online Course with high ratings and positive feedback from learners. Secondly, the course content is regularly updated to ensure you have the most relevant and up-to-date information. Lastly, cyber security is a rapidly growing field, and by acquiring the skills taught in this course, you will position yourself as a sought-after professional in a trending industry. Requirements: There are no specific prerequisites for this CyberSecurity Law Online course. However, a basic understanding of legal concepts and familiarity with digital technology will be beneficial in comprehending the course content effectively. Career Path: Upon completing this CyberSecurity Law Online Course, you will possess the knowledge and skills for various career opportunities in cyber law. Such as: Cybersecurity Analyst (£35,000 - £60,000 per annum) Data Protection Officer (£40,000 - £70,000 per annum) Cyber Security Consultant (£45,000 - £80,000 per annum) Digital Forensics Investigator (£30,000 - £60,000 per annum) IT Risk Manager (£50,000 - £90,000 per annum) Compliance Officer (£35,000 - £60,000 per annum) Cyber Law Attorney (£50,000 - £100,000 per annum) Certification: Upon successful completion of the Cybersecurity Law Online Course, you will receive a CPD certificate. This certification serves as a testament to your expertise and commitment to professional growth in the field of cyber law. Course Curriculum 11 sections • 11 lectures • 10:40:00 total length •Introduction to Cyber Law: 00:40:00 •Cyber Law Cyber Ethics and Online Gambling: 01:20:00 •Cyber Security and Trust in Cyberspace: 01:00:00 •Threat Factors Computer as a Target: 01:50:00 •Threats to Cyber Security by Criminals and Organised Crimes: 01:40:00 •Threats to Cybersecurity by Hacktivists and Nation-States: 01:00:00 •Cyberterrorism: 00:50:00 •An Evolving Threat The Deep Web: 01:00:00 •Fraud: 00:45:00 •Jurisdiction: 00:35:00 •Assignment - CyberSecurity Law Online Course: 00:00:00

CyberSecurity Law Online Course
Delivered Online On Demand10 hours 40 minutes
£12

Cyber Security Advanced Training

4.9(27)

By Apex Learning

Overview This comprehensive course on Cyber Security Advanced Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cyber Security Advanced Training comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cyber Security Advanced Training. It is available to all students, of all academic backgrounds. Requirements Our Cyber Security Advanced Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 15 lectures • 02:05:00 total length •Introduction: 00:04:00 •Cyber Security Everything You Need to Know: 00:10:00 •Types of Cyber Attacks: 00:11:00 •What is Hacking and How to Prevent It: 00:10:00 •Types of Hackers: 00:08:00 •Types of Malwares and How to Recognize Them: 00:10:00 •How to Detect and Protect Your Business From Malware Attacks: 00:09:00 •How to Identify, Prevent and Recover from Crypto Jacking: 00:08:00 •What is Phishing and Tips to Protect from Phishing Attacks: 00:07:00 •How to Guard Yourself from Visiting Unsafe Websites: 00:10:00 •Reduce the Risk of Cyber Attacks - Top Cyber Security Practices to Prevent a breach: 00:08:00 •Latest Cyber Security Tools You Should Know: 00:10:00 •Skill Needed for Cyber Security Expert: 00:09:00 •Tips to Create an Ideal Budget in Covid Era: 00:06:00 •How Should Companies Adapt their new Security Strategy post Pandemic?: 00:05:00

Cyber Security Advanced Training
Delivered Online On Demand2 hours 5 minutes
£12

Computer Hacking Forensic Investigator

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Hacking Forensic Investigator will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Hacking Forensic Investigator comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Hacking Forensic Investigator. It is available to all students, of all academic backgrounds. Requirements Our Computer Hacking Forensic Investigator is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 13 sections • 25 lectures • 14:11:00 total length •Overview: 00:35:00 •Reconnaissance: 00:25:00 •Protocols: 01:26:00 •Windows Hacking: 01:19:00 •Attacking Web Technologies: 00:56:00 •Pen Testing Wireless Networks: 01:34:00 •Introduction: 00:13:00 •Computer Forensic Incidents: 00:28:00 •Investigation Process: 00:54:00 •Disk Storage Concepts: 00:31:00 •Digital Acquisition & Analysis: 00:24:00 •Forensic Examination Protocols: 00:25:00 •Digital Evidence Protocols: 00:21:00 •CFI Theory: 00:25:00 •Digital Evidence Presentation: 00:22:00 •Computer Forensic Laboratory Protocols: 00:33:00 •Computer Forensic Processing: 00:22:00 •Digital Forensics Reporting: 00:20:00 •Specialized Artifact Recovery: 00:46:00 •Discovery and ESI: 00:12:00 •Cell Phone Forensics: 00:21:00 •USB Forensics: 00:06:00 •Incident Handling: 00:36:00 •PDA Forensics: 00:23:00 •Investigating Harassment: 00:14:00

Computer Hacking Forensic Investigator
Delivered Online On Demand14 hours 11 minutes
£12

Safeguarding Children: Internet Safety Course

4.9(27)

By Apex Learning

Overview This comprehensive course on Safeguarding Children: Internet Safety Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Safeguarding Children: Internet Safety Course comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Safeguarding Children: Internet Safety Course. It is available to all students, of all academic backgrounds. Requirements Our Safeguarding Children: Internet Safety Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 10 sections • 10 lectures • 04:25:00 total length •The Concept of Internet Safety for the Children: 00:46:00 •The Concept of Privacy and Appropriate Online Content: 00:33:00 •Cyberbullying: 00:39:00 •Internet Grooming: 00:41:00 •Appropriate Measures for Safeguarding Your Child: 00:34:00 •Safe Use of Social Media: 00:16:00 •Mobile Device Safety: 00:19:00 •Tools and Tips for Monitoring Child's Internet Use: 00:18:00 •Identifying, Preventing and Overcoming Internet Addiction: 00:19:00 •Assignment - Safeguarding Children: Internet Safety Course: 00:00:00

Safeguarding Children: Internet Safety Course
Delivered Online On Demand4 hours 25 minutes
£12

Diploma in Cyber Security Advanced Training - Level 3 (QLS Endorsed)

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support

Diploma in Cyber Security Advanced Training - Level 3 (QLS Endorsed)
Delivered Online On Demand2 hours
£15

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry