• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1417 Network & Security courses delivered Online

CompTIA Masterclass: CompTIA A+, CompTIA Network+, CompTIA Security+ Certification

4.8(9)

By Skill Up

CompTIA Training | 25 Courses Programme | CPD Certified | Free PDF & Transcript Certificate | Lifetime Access

CompTIA Masterclass: CompTIA A+, CompTIA Network+, CompTIA Security+ Certification
Delivered Online On Demand8 days
£150

Web Application Hacking with Burp Suite

By Packt

This course will introduce Burp Suite and demonstrate the common modules and tools used by web application hackers to find and exploit vulnerabilities. This course provides practical examples through the PortSwigger labs and DVWA to help solidify the concepts and give you the opportunity to exploit systems.

Web Application Hacking with Burp Suite
Delivered Online On Demand2 hours
£33.99

QUALIFI Level 3 Diploma in Cyber Security Management and Operations

By School of Business and Technology London

Getting Started   QUALIFI Level 3 Diploma in Cyber Security Management and Operations has been created to develop those learners who are looking to choose, or already have, a career in a business-related sector. It is envisaged that this programme will encourage both academic and professional development so that your learners move forward to realise their potential and that of organisations across a broad range of sectors. This qualification is specifically intended for organisational managers and leaders in charge of cyber security, digital risk management, or supervision. The main focus of the qualification is to prepare administrators and managers for the management and operation of generic, non-technical cyber safety operations within a company, third sector or government organisation. The qualification will: prepare learners for employment, and support a range of cybersecurity-related roles in the workplace. This Level 3 qualification is a holistic discipline about 'cyber safety.' It examines both IT-related domains of 'cyber' and' safety.' Consequently, it is a non-technical qualification in most areas that examines both cyber-technical and cyber-physical safety threats, hazards, reactions and risk treatments. Key Benefits   This qualification will bring you many vital benefits, such as; The ability to read and use appropriate literature with a full understanding. Applying subject knowledge and understanding to address familiar and unfamiliar problems. An appreciation of the interdisciplinary nature of business and service provision. Recognising the moral and ethical issues of business practice and research. Transferable skills and knowledge will enable individuals to meet changing environments and risks. Upon completing this Level 3 diploma, learners can progress to a Qualifi Level 4 Diploma in Cyber Security.   Key Highlights Are you aiming to become an organisational executive and leader responsible for cyber security, digital risk management, or oversight? Then, the Qualifi Level 3 Diploma in Cyber Security Management and Operations is the ideal starting point for your career journey. The program allows individuals to forge a career in a specific business area by seeking a more excellent knowledge and understanding of cyber and information security and to support the individual's development into senior positions. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our Qualifi-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The Qualifi Level 3 Diploma in Cyber Security Management and Operations can open many career pathways including, but not limited to: Security Consultant, with an estimated average salary of £32,000 per annum IT Security Trainee with an estimated average salary of £26,833 per annum IT Security Analyst with an estimated average salary of £35,000 per annum Ethical Hackers with an estimated average salary of £34,777 per annum Computer Forensics, with an estimated average salary of £34,817 per annum Penetration Tester with an estimated average salary of £30,000 per annum Cyber Security Technician with an estimated average salary of £27,277 per annum   About Awarding Body QUALIFI, recognised by Ofqual awarding organisation has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Leadership, Hospitality & Catering, Health and Social Care, Enterprise and Management, Process Outsourcing and Public Services. They are liable for awarding organisations and thereby ensuring quality assurance in Wales and Northern Ireland. What is included?   Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, practical applications including real-world examples, and case studies will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform. This facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Assessment Time-constrained scenario-based assignments No examinations Entry Requirements   The qualifications have been designed to be accessible without artificial barriers restricting access and progression. Entry to the qualifications will be through a centre interview, and applicants will be expected to hold the following. Qualifications at Level 2 and; Work experience in a business environment and demonstrate ambition with clear career goals; A Level 3 qualification in another discipline and who want to develop their careers in business management and risk management   Progression Learners completing the QUALIFI Level 3 Diploma in Cyber Security Management and Operations can progress to: the QUALIFI Level 4 Diploma in Cyber Security, or directly into employment in an associated profession. Why gain a QUALIFI Qualification?   This suite of qualifications provides enormous opportunities to learners seeking career and professional development. The highlighting factor of this qualification is that: The learners attain career path support who wish to pursue their career in their denominated sectors; It helps provide a deep understanding of the health and social care sector and managing the organisations, which will, in turn, help enhance the learner's insight into their chosen sector. The qualification provides a real combination of disciplines and skills development opportunities. The Learners attain in-depth awareness concerning the organisation's functioning, aims and processes. They can also explore ways to respond positively to this challenging and complex health and social care environment. The learners will be introduced to managing the wide range of health and social care functions using theory, practice sessions and models that provide valuable knowledge. As a part of this suite of qualifications, the learners will be able to explore and attain hands-on training and experience in this field. Learners also achieve the ability to face and solve issues then and there through exposure to all the Units. The qualification will also help to Apply scientific and evaluative methods to develop those skills. Find out threats and opportunities. Develop knowledge in managerial, organisational and environmental issues. Develop and empower critical thinking and innovativeness to handle issues and difficulties. Practice judgment, own and take responsibility for decisions and actions, and Develop the capacity to perceive and reflect on individual learning and improve their social and other transferable aptitudes and skills.   Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. To know about the Qualification Structure, please get in touch with us at: admission@sbusinesslondon.ac.uk Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

QUALIFI Level 3 Diploma in Cyber Security Management and Operations
Delivered Online On Demand11 months
£780.35

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 6 - Security Assessment and Testing. This course focuses on how we assess and test the security measures we have in place; this is done to ensure we are as secure as we think we are and to improve our security posture. Domain 6 makes up 12% of the exam questions.

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022
Delivered Online On Demand1 hour 17 minutes
£74.99

MikroTik Network Management

By Course Cloud

The comprehensive MikroTik Network Management has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the MikroTik Network Management today, and learn from the very best the industry has to offer! This best selling MikroTik Network Management has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth MikroTik Network Management is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The MikroTik Network Management is CPD-accredited, so you can be confident you're completing a quality training course which will boost your CV and enhance your career potential. The MikroTik Network Management is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the MikroTik Network Management, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the MikroTik Network Management will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the MikroTik Network Management to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email. 

MikroTik Network Management
Delivered Online On Demand
£25

Complete Web Application Penetration Testing & Security

By Course Cloud

Hackers are getting more and more advanced, which is why it's crucial to be able to detect vulnerabilities in your systems and networks. The Complete Web Application Penetration Testing & Security course has been designed by industry experts to provide learners with the in-depth knowledge they need to fast track their career. You will learn client-side security techniques, basic HTTP protocol, how HTTP cookies are stored, and much more. Through this course, you will learn a hands-on practical approach to hacking websites like a pro. It will teach you how to identify vulnerabilities in files, exploring key topics such as cross-site forgery and cross-site scripting. Whether you are a computer science student, web app developer or aspiring Penetration Tester, this course will equip you with the skill you need to protect your company from cyber attacks. This best selling Complete Web Application Penetration Testing & Security has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Complete Web Application Penetration Testing & Security is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Complete Web Application Penetration Testing & Security is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Complete Web Application Penetration Testing & Security is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Complete Web Application Penetration Testing & Security, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Complete Web Application Penetration Testing & Security will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Complete Web Application Penetration Testing & Security to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Complete Web Application Penetration Testing & Security
Delivered Online On Demand
£25

Penetration Testing with OWASP ZAP

By Course Cloud

The OWASP Zed Attack Proxy is an open source means of testing web applications manually. It is one of the leading tools for identifying web application vulnerabilities. The Penetration Testing with OWASP ZAP course will take you through the basic functions of ZAP, equipping you with a range of ethical hacking skills needed to become a successful Web Developer or Penetration Tester. It will take you through the very basics, from how to install ZAP, to the steps for configuring your browser to use AP as a proxy.  By the end of this course, you will be able to use ZAP to assess web applications and conduct penetration testing to identify vulebrailities and uncover hidden bugs. You will also be able to identify opportunities to strengthen your company's and create reports of your results. This best selling Penetration Testing with OWASP ZAP has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Penetration Testing with OWASP ZAP is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Penetration Testing with OWASP ZAP is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Penetration Testing with OWASP ZAP is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Penetration Testing with OWASP ZAP, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Penetration Testing with OWASP ZAP will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Penetration Testing with OWASP ZAP to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Penetration Testing with OWASP ZAP
Delivered Online On Demand
£25

Splunk for Beginners: Make the Most of Machine Data Using Splunk

By Packt

In this course, you will learn to create effective visualizations for different stakeholders with the Splunk web framework, utilize tokens and event handlers, explore SDKs, interact with REST APIs, and build a test lab for log analysis and incident response.

Splunk for Beginners: Make the Most of Machine Data Using Splunk
Delivered Online On Demand5 hours 27 minutes
£26.99

Cyber Security Programming MasterClass- CPD Certified

4.7(26)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Cyber Security Programming MasterClass Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Are you a professional feeling stuck in your career, struggling to keep up with the ever-changing demands of the industry? Or perhaps you're a beginner, unsure of where to start or how to break into your desired field. Whichever stage you're in, our exclusive Cyber Security Programming MasterClass Bundle provides unique insights and tools that can help you achieve your goals. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Cyber Security Programming MasterClass bundle is a comprehensive program that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in Cyber Security Programming MasterClass Online Training, you'll receive 25 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Bundle: Course 01: Cyber Security Advanced Training Course 02: CompTIA Security+ (SY0-601) Course 03: CEH - Certified Ethical Hacker Course 04: Cyber Security Incident Handling and Incident Response Course 05: Computer Networks Security Course 06: Certified Information Systems Security Professional (CISSP) Course 07: Cyber Security Level 3 Course 08: Digital Forensics for Cyber Professionals Course 09: Cyber Intelligence Officer Course 10: AWS Certified Solutions Architect Associate Course 11: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 12: Cyber Law Online Course Course 13: GDPR Course 14: Security Analyst Course 15: Certified Information Security Manager (CISM) Course 16: SQL Programming Masterclass Course 17: Python Programming for Everybody Course 18: CompTIA PenTest+ (Ethical Hacking) Course 19: Secure Programming of Web Applications Course 20: IT Support Technician Course 21: C# Programming - Beginner to Advanced Course 22: Machine Learning Basics Course 23: Web Application Penetration Testing Course Course 24: Data Center Training Essentials: General Introduction Course 25: CompTIA CySA+ Cybersecurity Analyst (CS0-002) With Cyber Security Programming MasterClass, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. And with 24/7 tutor support, you'll never feel alone in your journey, whether you're a seasoned professional or a beginner. Don't let this opportunity pass you by. Enrol in Cyber Security Programming MasterClass today and take the first step towards achieving your goals and dreams. Why buy this Cyber Security Programming MasterClass? Free CPD Accredited Certificate upon completion of Cyber Security Programming MasterClass Get a free student ID card with Cyber Security Programming MasterClass Lifetime access to the Cyber Security Programming MasterClass course materials Get instant access to this Cyber Security Programming MasterClass course Learn Cyber Security Programming MasterClass from anywhere in the world 24/7 tutor support with the Cyber Security Programming MasterClass course. Start your learning journey straightaway! The Cyber Security Programming MasterClass premium bundle consists of 25 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of Cyber Security Programming MasterClass is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of the Cyber Security Programming MasterClass course. After passing the Cyber Security Programming MasterClass exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This bundle is ideal for: Students seeking mastery in this field Professionals seeking to enhance their skills Anyone who is passionate about this topic Requirements This Cyber Security Programming MasterClass doesn't require prior experience and is suitable for diverse learners. Career path This Cyber Security Programming MasterClass bundle will allow you to kickstart or take your career in the related sector to the next stage. Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

Cyber Security Programming MasterClass- CPD Certified
Delivered Online On Demand5 days
£149

IT Administration and Networking

5.0(10)

By Apex Learning

Overview This comprehensive course on IT Administration and Networking will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT Administration and Networking comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this IT Administration and Networking. It is available to all students, of all academic backgrounds. Requirements Our IT Administration and Networking is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 128 lectures • 00:55:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Identify the Importance of Risk Management: 00:11:00 •Assess Risk: 00:13:00 •Mitigate Risk: 00:24:00 •Integrate Documentation into Risk Management: 00:15:00 •Classify Threats and Threat Profiles: 00:08:00 •Perform Ongoing Threat Research: 00:13:00 •Resources that Aid in Research of Threats: 00:03:00 •Implement Threat Modeling: 00:10:00 •Assess the Impact of Reconnaissance Incidents: 00:11:00 •Performing Reconnaissance on a Network: 00:07:00 •Examining Reconnaissance Incidents: 00:08:00 •Assess the Impact of Social Engineering: 00:11:00 •Assessing the impact of Social Engineering: 00:08:00 •Assessing the Impact of Phishing: 00:03:00 •Types of Wireless Attacks: 00:30:00 •Intrusion Monitoring: 00:08:00 •Wireless Security Risks: 00:22:00 •Authentication Attacks: 00:21:00 •Rogue Devices: 00:04:00 •Public Hotspots: 00:07:00 •Wireless Security Monitoring: 00:21:00 •Device Tracking: 00:18:00 •WLAN Security Infrastructure: 00:38:00 •Management Protocols: 00:23:00 •Other RADIUS Solutions: 00:16:00 •Introduction: 00:30:00 •Child Safety Online: 01:00:00 •Secure Payment Sites: 01:00:00 •Online Banking: 00:30:00 •How To Keep Your Password Safe: 00:30:00 •Common Scams: 01:00:00 •How I Got Pharmed: 01:00:00 •Virus Protection: 01:00:00 •Self Maintenance: 00:30:00 •Personal Information Online: 01:00:00 •Is The Internet Safe?: 00:30:00 •Importance of Cyber Security: 00:30:00 •Spyware Can Destroy: 00:30:00 •How Does Spyware Spread?: 01:00:00 •How To Remove Spyware: 01:00:00 •Anti Spyware Program: 01:00:00 •The Anti Anti-Spyware Programs: 00:30:00 •Research And Learn More: 00:30:00 •Choosing The Best Anti Spyware Tool: 01:00:00 •Computer Security And Spyware: 01:00:00 •The Programs To Avoid: 00:15:00 •Is It Legal?: 00:30:00 •Checklist Of Protection: 00:15:00 •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:00:00 •Recover from a Security Incident: 00:10:00 •OSI Layers: 00:44:00 •LANs and WANs: 00:14:00 •Network Types: 00:07:00 •Transmissions: 00:36:00 •Cables: 00:41:00 •Fiber Optics: 00:17:00 •Converters and Connectors: 00:27:00 •Wireless Security: 00:15:00 •Authentication.prproj: 00:21:00 •Wireless Security Threats: 00:30:00 •TACACS: 00:10:00 •Keys: 00:26:00 •RADIUS: 00:07:00 •VPN Technologies: 00:16:00 •Tunneling Protocols.prproj: 00:05:00 •Acceptable Use: 01:00:00 •Common Problems: 00:32:00 •Troubleshooting: 00:28:00 •Network Technician Tools: 00:46:00 •Physical and Logical Issues: 00:19:00 •Open or Closed Ports: 00:09:00 •ARP Issues: 00:13:00 •Core Concepts in Healthcare IT: 00:06:00 •EMR EHR Issues: 00:05:00 •Regulations, Standards, and Stakeholders: 00:14:00 •HIPAA Controls and Compliance: 00:08:00 •Roles and Responsibilities: 00:10:00 •Manage Communication and Ethics Issues: 00:15:00 •Legal Best Practices, Requirements, and Documentation: 00:09:00 •Medical Document Imaging: 00:04:00 •Sanitation Management: 00:03:00 •Computing Essentials: 00:05:00 •Networking: 00:33:00 •Manage Servers and Software: 00:27:00 •Hardware Support: 00:14:00 •Set Up a Workstation: 00:08:00 •Troubleshoot Basic IT Issues: 00:15:00 •Troubleshoot Medical IT Issues: 00:20:00 •Implementation of an EMR EHR System: 00:34:00 •Change Control: 00:08:00 •Manage Physical and Logical Security: 00:36:00 •Implement Security Best Practices and Threat Mitigation Techniques: 00:13:00 •Manage Remote Access: 00:06:00 •Manage Wireless Security: 00:15:00 •Perform Backups and Disaster Recovery: 00:16:00

IT Administration and Networking
Delivered Online On Demand55 minutes
£12