• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6945 Network courses in Nottingham delivered On Demand

Cisco CCNA (200-301) Volume 2 Online Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want Why Cisco CCNA (200-301) Volume 2 Course right for you? Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this Cisco CCNA (200-301) Volume 2 course will set you up with a solid foundation to become a confident networking engineer and develop more advanced skills. This comprehensive Cisco CCNA (200-301) Volume 2 course is the perfect way to kickstart your career in the field of Cisco CCNA and networking. This course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Cisco CCNA (200-301) Volume 2 Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Security Introduction to ACL ACL Lab SwitchPort Security SwitchPort Security Lab Understanding DHCP DHCP Configuration Lab DHCP Snooping DHCP Snooping Lab Securing Network Devices Dynamic ARP Inspection Device Management Protocol SNMP Protocol SYSLOG Message Logging Network Address Translation (NAT) Network Time Protocol CDP and LLDP (LAB) Network Address Translation IP Services HSRP Redundancy Protocol HSRP Redundancy Protocols Lab QoS QoS Part 1 QoS Part 2 QoS Lab WAN Architecture Metro Ethernet MPLS MPLS OSPF MPLS OSPF Lab Virtual Private Network Cloud Architecture Understanding Cloud Architecture Controller Based Networks SDN and Controller Based Networks Cisco Software Design Access Programability Understanding Rest and JSON Understanding Chef Puppet and Ansible Who should take this course? This comprehensive Cisco CCNA (200-301) Volume 2 course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of Cisco CCNA and networking. Entry Requirements There are no academic entry requirements for this Cisco CCNA (200-301) Volume 2 course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method On successful completion of the course, you will be required to sit an online multiple-choice assessment. The assessment will be evaluated automatically and the results will be given to you immediately. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Cisco CCNA (200-301) Volume 2 Online Course
Delivered Online On Demand
£25

Foundations of IT Security: Protecting Digital Assets

4.5(3)

By Studyhub UK

Dive deep into the realm of cyber safety with 'Foundations of IT Security: Protecting Digital Assets'. This curriculum ensures you grasp the essentials of IT defence, from understanding the rudiments to grasping advanced techniques. Chart your journey through crucial subjects such as network safety, OS safeguarding and the profound world of cryptography. In an era where digital threats loom large, this comprehensive programme equips you with the knowledge to defend the vast expanse of digital assets effectively. Learning Outcomes Understand the core principles of IT security and its significance. Develop insights into setting up and managing robust security policies and procedures. Master the intricacies of network, operating system, and web protection. Delve into the art of cryptography and familiarise with advanced encryption methods. Stay abreast with the latest and upcoming shifts in IT security paradigms. Why buy this Foundations of IT Security: Protecting Digital Assets? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Foundations of IT Security: Protecting Digital Assets for? Individuals keen on delving into the digital protection domain. IT professionals aiming to bolster their security knowledge. Entrepreneurs wishing to safeguard their digital assets. Technical enthusiasts curious about evolving IT security trends. Organisations aspiring to upgrade their digital defence mechanisms. Career path IT Security Analyst: £40,000 - £60,000 Network Security Specialist: £45,000 - £65,000 Cryptographer: £50,000 - £70,000 Web Security Administrator: £42,000 - £58,000 Wireless Security Consultant: £47,000 - £68,000 Digital Protection Strategist: £52,000 - £75,000 Prerequisites This Foundations of IT Security: Protecting Digital Assets does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00

Foundations of IT Security: Protecting Digital Assets
Delivered Online On Demand1 hour 56 minutes
£10.99

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)

By Hudson

The Computing Technology Industry Association (CompTIA) is the association representing the international technology community. Its goal is to provide a unified voice, global advocacy and leadership, and to advance industry growth through standards, professional competence, and education and business solutions. In order to most efficiently serve the industry and its members, CompTIA has developed specialized initiatives and programs dedicated to major areas within the IT industry. They include, convergence technology, e-commerce, IT training, software services, certification, public policy and workforce development. This bundle offers incredible value for money for anyone looking to get CompTIA certified. It includes 6 separate certification courses, spanning a variety of disciplines and technical fields from IT technician skills, to networking, and IT security, plus more!

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)
Delivered Online On Demand
£1,495

Ethical Hacking - Capture the Flag Walkthroughs - v1

By Packt

Explore capture-the-flag exercises that will strengthen your ethical hacking skills

Ethical Hacking - Capture the Flag Walkthroughs - v1
Delivered Online On Demand2 hours 42 minutes
£13.99

Level 5 Diploma in IT - Networking

4.7(160)

By Janets

Register on the Level 5 Diploma in IT - Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Level 5 Diploma in IT - Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Level 5 Diploma in IT - Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Level 5 Diploma in IT - Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

Level 5 Diploma in IT - Networking
Delivered Online On Demand3 days
£25

Fundamentals of IT Security Course

5.0(2)

By Training Express

In today's fast-paced digital world, the need for robust IT security has never been more important. The Fundamentals of IT Security Course offers a solid foundation in the critical aspects of protecting data, networks, and systems from evolving threats. With cybercrime on the rise, understanding the core principles of IT security is vital for individuals and businesses alike. This course covers everything from the basics of network security to the intricacies of encryption, firewalls, and access control. Whether you're looking to secure personal information or ensure the integrity of an organisation's data, this course provides the essential knowledge required. Delve into topics like threat identification, risk management, and security protocols without needing to be a tech expert. As cyber threats become more sophisticated, learning these fundamentals ensures you're equipped to navigate the ever-changing landscape of digital security. With a straightforward approach, you'll gain a strong grasp of how to protect your digital assets effectively and confidently. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to IT Security Module 2: Security Policies and Procedures Module 3: Network Security Module 4: Operating System Security Module 5: Cryptography and Encryption Module 6: Web Security Module 7: Wireless Security Module 8: Emerging Trends in IT Security Learning Outcomes Develop robust security policies for effective digital defence. Implement advanced network security measures to thwart cyber threats. Fortify operating systems against potential vulnerabilities. Master cryptographic techniques for secure data transmission. Safeguard web environments with advanced security protocols. Stay abreast of emerging trends, ensuring proactive IT Security measures. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? IT professionals seeking to enhance security knowledge. Network administrators aiming to strengthen their skill set. Web developers interested in securing online environments. Cybersecurity enthusiasts looking for comprehensive training. System administrators aiming to bolster operating system security. IT students seeking a solid foundation in security practices. Individuals pursuing a career in wireless network security. Professionals keen on staying updated with emerging security trends. Career path Security Analyst Network Security Specialist Systems Administrator Cryptographer Web Security Consultant Wireless Security Engineer Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Fundamentals of IT Security Course
Delivered Online On Demand1 hour
£12

Cloud Infrastructure Engineer Diploma - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Cloud Infrastructure Engineer Diploma Mega Bundle** Cloud Infrastructure Engineer Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Cloud Infrastructure Engineer Diploma package online with Studyhub through our online learning platform. The Cloud Infrastructure Engineer Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Cloud Infrastructure Engineer Diploma course provides complete 360-degree training on Cloud Infrastructure Engineer Diploma. You'll get not one, not two, not three, but twenty-five Cloud Infrastructure Engineer Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Cloud Infrastructure Engineer Diploma courses are yours for as long as you want them once you enrol in this course This Cloud Infrastructure Engineer Diploma Bundle consists the following career oriented courses: Course 01: CompTIA Cloud+ (CV0-002) Course 02: AWS Certified Solutions Architect Associate Preparation Course 03: Data Center Training Essentials: General Introduction Course 04: Data Center Training Essentials: Mechanical & Cooling Course 05: Internet of Things (IoT) Course 06: Web Application Penetration Testing Course 07: Blockchain Project Management Training Course 08: SQL Database Management Course 09: CompTIA Security+ Course 10: Microsoft Azure Machine Learning Course 11: Cyber Security Incident Handling and Incident Response Course 12: IT Administration and Networking Course 13: Network Security and Risk Management Course 14: CompTIA Network+ Certification (N10-007) Course 15: Security Analyst Course 16: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 17: CompTIA ITF+ (FCO-U61) Course 18: Information Governance and Data Management Training Course 19: Quick Data Science Approach from Scratch Course 20: Deep Learning Neural Network with R Course 21: Cyber Security Awareness Training Course 22: Diploma in CompTIA A+ Course 23: Computer Networks Security from Scratch to Advanced Course 24: Functional Skills IT/ ICT Course 25: Computer Workstation Safety Training The Cloud Infrastructure Engineer Diploma course has been prepared by focusing largely on Cloud Infrastructure Engineer Diploma career readiness. It has been designed by our Cloud Infrastructure Engineer Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Cloud Infrastructure Engineer Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Cloud Infrastructure Engineer Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Cloud Infrastructure Engineer Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Cloud Infrastructure Engineer Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Cloud Infrastructure Engineer Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Cloud Infrastructure Engineer Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Cloud Infrastructure Engineer Diploma lessons One to one assistance from Cloud Infrastructure Engineer Diplomaprofessionals if you need it Innovative exams to test your knowledge after the Cloud Infrastructure Engineer Diplomacourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Cloud Infrastructure Engineer Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Cloud Infrastructure Engineer Diploma certificate and transcript on the next working day Easily learn the Cloud Infrastructure Engineer Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cloud Infrastructure Engineer Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Cloud Infrastructure Engineer Diploma Certified Cloud Professional (CCP) MCSE Cloud Platform & Infrastructure Cloud Security Alliance Requirements To participate in this Cloud Infrastructure Engineer Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Cloud Infrastructure Engineer Diploma Career path You will be able to kickstart your Cloud Infrastructure Engineer Diploma career because this course includes various courses as a bonus. This Cloud Infrastructure Engineer Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Cloud Infrastructure Engineer Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Cloud Infrastructure Engineer Diploma - CPD Certified
Delivered Online On Demand6 days
£279

Internet of Things (IoT)

4.9(27)

By Apex Learning

**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This Internet of Things (IoT) will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this Internet of Things (IoT) will help you keep ahead of the pack. The Internet of Things (IoT) incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this Internet of Things (IoT) will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Internet of Things (IoT), you can equip yourself with the essentials to keep you afloat in the competition. Along with this Internet of Things (IoT) course, you will get 10 premium courses, an original Hardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This Internet of Things (IoT) Bundle Consists of the following Premium courses: Course 01: Internet of Things Course 02: Internet of Things Hacking Course 03: Automation Course 04: Learning Computers and Internet Level 2 Course 05: AWS Essentials Course 06: Encryption Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA Networking - Level 4 Course 09: Network Security Level 2 Course 10: Cyber Security Incident Handling and Incident Response Course 11: Data Center Training Essentials: General Introduction So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Internet of Things (IoT): Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of Internet of Things (IoT) Bundle Course 01: Internet of Things Course Agenda Unit 01: Introduction Unit 02: Raspberry Pi Installation Unit 03: Getting Around Raspberry Pi Unit 04: Raspberry Pi GPIO Output Unit 05: Output from Raspberry Pi Unit 06: Inputs to Raspberry Pi Unit 07: Sensor Interfacing Unit 08: Interfacing of I2C Based BMP180 Sensor with Raspberry Pi Unit 09: Internet of Things with Microsoft Azure Unit 10: IoT with Thingspeak Unit 11: Learn a new platform, Adafruit IO Unit 12: IOT Security Course 02: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics Course 03: Automation Module 01: Introduction Module 02: Overview of Automation Concepts and Tools Module 03: Common Automation Workflows and Campaigns Module 04: Build Your First Workflow from Scratch Course 04: Cloud Computing / CompTIA Cloud+ (CV0-002) Section 01: What You Need to Know Section 02: Introducing the Cloud Section 03: System Requirements for Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating to the Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Course 05: AWS Essentials Section 01: AWS Foundations and Services Section 02: AWS Security and Costs Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Basics Blockchain Section 01: Introduction Section 02: Underlying technologies of Blockchain Section 03: Advantages of Blockchain Section 04: How Blockchain works Section 05: Types of blockchain and bitcoin Section 06: Libra [Facebook's cryptocurrency] Section 07: Ethereum [The revolution in Blockchain technology] Section 08: Forming Blockchain Solutions Course 08: Cisco ASA Firewall Training Lecture 01: Common Network Security Terms Lecture 02: Confidentiality, Integrity, Availability. Lecture 03: Security Concepts & Terms Lecture 04: Intro to Firewall Technologies Lecture 05: About Cisco ASA Firewall Lecture 06: Install Cisco ASAv Firewall in GNS3 Lecture 07: Install ASA 9 Cluster, Security Context enable in GNS3. Lecture 08: Install Cisco ASAv Firewall on EVE-NG Lecture 09: Install Cisco ASAv Firewall on VMWare Workstation. Lecture 10: Cisco ASA Firewall Basic Configuration Commands. Lecture 11: Device Management Cisco ASA Console Lecture 12: Device Management Cisco ASA Telnet Lecture 13: Device Management Cisco ASA SSH Lecture 14: Device Management Cisco ASA ASDM Lecture 15: Device Management Cisco ASA TFTP Lecture 16: Device Management Cisco ASA FTP Lecture 17: Security Levels and Zoning in Cisco ASA Lecture 18: Introduction to Routing & Static Routing Lecture 19: Network Route Configuration in Cisco ASA Lecture 20: Host Route Configuration in Cisco ASA Lecture 21: Default Route Configuration in Cisco ASA Lecture 22: Floating Static Route Configuration in ASA Lecture 23: IP SLA (Service Level Agreement) in ASA Lecture 24: Dynamic Routing Protocol RIP version 2 Lecture 25: Dynamic Routing Protocol EIGRP Configuration Lecture 26: Dynamic Routing Protocol OSPF Configuration Lecture 27: Routing Protocols Redistribution Lecture 28: Implement Access Control Lists in ASA Lecture 29: Configure & Verify Extended ACLs in ASA Lecture 30: Configure & Verify Infrastructure ACLs Lecture 31: Configure & Verify Time-Based ACLs Lecture 32: Configure & Verify Standard ACLs Lecture 33: Configure & Verify Object Groups ACLs Lecture 34: Configure & Verify DHCP Server in ASA Lecture 35: Configure & Verify DHCP Relay in ASA Lecture 36: Introduction & Theory of NAT and PAT ASA Lecture 37: Creating Lab Topology for NAT & PAT Lecture 38: Static NAT in Cisco ASA Lecture 39: Static PAT in Cisco ASA Lecture 40: Dynamic NAT in Cisco ASA Lecture 41: Dynamic PAT in Cisco ASA Lecture 42: Identity NAT in Cisco ASA Lecture 43: Policy NAT in Cisco ASA Lecture 44: Modular Policy Framework (MPF) Lecture 45: Transparent Firewall Lecture 46: ASDM Walkthrough Lecture 47: Security Contexts (Multi-Contexts) Lecture 48: Redundancy, HA, Active/Standby Failover Lecture 49: Packet Capture in Cisco ASA Firewall Lecture 50: Packet Tracer in Cisco ASA Firewall Lecture 51: Syslog Logging in Cisco ASA Firewall Lecture 52: Introduction and Concept of Cryptography & Terminologies Lecture 53: Introduction & Concept of Symmetric & Asymmetric Encryption Lecture 54: Introduction and Concept of Cryptography Hash (SHA, MD5) Lecture 55: Introduction and Concept of Virtual Private Network VPN Lecture 56: Introduction and Concept of IPSec Protocols Features Lecture 57: Introduction and Concept of Diffie-Hellman (DH) And Much More... Course 09: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Course 10: Cyber Security Level 3 Module 01: Getting Started Module 02: Cyber security Fundamentals Module 03:Types of Malware Module 04: Cyber Security Breaches Module 05: Types of Cyber Attacks Module 06: Prevention Tips Module 07: Mobile Protection Module 08: Social Network Security Module 09: Prevention Software Module 10: Critical Cyber Threats Module 11: Defense Against Hackers Module 12: Closing Course 11: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internet of Things (IoT) bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Internet of Things (IoT) is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Internet of Things) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Internet of Things (IoT)
Delivered Online On Demand
£53

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£11.99

Linux Security and Hardening

4.5(3)

By Studyhub UK

The 'Linux Security and Hardening' course focuses on strengthening the security measures of Linux systems. It covers various aspects of security, including general security practices, physical security, account security, network security, and file system security. Learners will gain valuable knowledge and techniques to enhance the security of Linux environments. Learning Outcomes: Understand the importance of Linux security and its significance in protecting systems and data. Implement general security best practices, including updates, patches, and system configurations. Secure physical access to Linux servers and prevent unauthorized access. Manage user accounts and permissions effectively to maintain a secure environment. Apply network security measures, including firewalls, to safeguard against external threats. Set up file system security and encryption to protect sensitive data. Explore additional resources for continuous learning and staying up-to-date with Linux security practices. Why buy this Linux Security and Hardening? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Linux Security and Hardening there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Linux Security and Hardening course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Linux Security and Hardening does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux Security and Hardening was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Linux Security and Hardening is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment - Linux Security and Hardening 00:00:00

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£10.99