• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8264 Network courses in Nottingham delivered Online

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. Course Outline Exploring the Functions of Networking ? Lecture Introducing the Host-to-Host Communications Model ? Lecture Operating Cisco IOS Software ? Lecture Introducing LANs ? Lecture Exploring the TCP/IP Link Layer ? Lecture Starting a Switch ? Lecture Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture Explaining the TCP/IP Transport Layer and Application Layer ? Lecture Exploring the Functions of Routing ? Lecture Configuring a Cisco Router ? Lecture Exploring the Packet Delivery Process ? Lecture Troubleshooting a Simple Network ? Lecture Introducing Basic IPv6 ? Lecture Configuring Static Routing ? Lecture Implementing VLANs and Trunks ? Lecture Routing Between VLANs ? Lecture Introducing OSPF ? Lecture Building Redundant Switched Topologies ? Self-study Improving Redundant Switched Topologies with EtherChannel ? Lecture Exploring Layer 3 Redundancy ? Self-study Introducing WAN Technologies ? Self-study Explaining Basics of ACL ? Lecture Enabling Internet Connectivity ? Lecture Introducing QoS ? Self-study Explaining Wireless Fundamentals ? Self-study Introducing Architectures and Virtualization ? Self-study Explaining the Evolution of Intelligent Networks ? Lecture Introducing System Monitoring ? Lecture Managing Cisco Devices ? Lecture Examining the Security Threat Landscape ? Self-study Additional course details: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered OnlineFlexible Dates
£4,195

VMware vRealize Network Insight: Install, Configure, Manage [v6.1]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network professionals and who design, build, operate, manage, and troubleshoot software-defined networking and security, and application owners who need visibility across multi-cloud environments Overview By the end of the course, you should be able to meet the following objectives: Explain the features and architecture of vRealize Network Insight Describe the vRealize Network Insight installation processes and requirements Navigate the vRealize Network Insight GUI Describe major use cases for vRealize Network Insight and their benefits Deploy vRealize Network Insight Use vRealize Network Insight to monitor, operate, analyze, and troubleshoot the infrastructure supporting your applications This two-day, hands-on course gives you the skills to deploy and use VMware vRealize© Network Insight? to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of vRealize Network Insight and how to use it to simplify daily operation and troubleshooting tasks. Course Introduction Introductions and course logistics Course objectives Introduction to vRealize Network Insight Identify the use cases for vRealize Network Insight Access the vRealize Network Insight Home page View vRealize Network Insight entity data Perform searches for specific entity data Create entity search queries Find and use event data vRealize Network Insight Architecture and Components Identify the components of vRealize Network Insight Describe the function of each component and how the components interact Check the health of vRealize Network Insight components vRealize Network Insight Installation Deploy vRealize Network Insight components Configure the pairing relationship between the platform VM and the collector VM Troubleshoot platform VM and collector VM configuration problems Explain how data sources export flow information Add VMware vCenter Server© to vRealize Network Insight Add a VMware NSX-T© data source to vRealize Network Insight Configure IPFIX Distinguish between the mechanisms used to scale vRealize Network Insight Select the appropriate scaling mechanism for your environment Describe how clusters are expanded Integrate VMware vRealize© Operations? with vRealize Network Insight Import a vRealize Network Insight instance into VMware vRealize© Suite Lifecycle Manager? vRealize Network Insight Use Cases Explain use cases for vRealize Network Insight Create vRealize Network Insight applications Perform application discovery Plan and optimize micro-segmentation and security for applications Explain the use of flow analytics Use flow information from physical devices in security planning Generate virtual machine path topologies between entities using flows Extract useful information from path topologies Validate NSX-T and NSX for vSphere deployments Monitor and troubleshoot NSX-T events Operations and Troubleshooting Common Issues Perform vRealize Network Insight operations by using VMware vSphere© tags Use the flow analytics dashboards to perform flow analysis Set and configure thresholds to identify aberrations in the behavior of entities Use vRealize Network Insight tools to troubleshoot common problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Network Insight: Install, Configure, Manage [v6.1] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Network Insight: Install, Configure, Manage [v6.1] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Network Insight: Install, Configure, Manage [v6.1]
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Linux Network Administration

By Packt

Welcome to the Linux Network Administration course for beginners, designed for students who want to learn everything about the networking components within a Linux system. This course is essential for anyone working with Linux, covering basic to intermediate networking concepts and skills, providing a solid foundation for pursuing a career in the field.

Linux Network Administration
Delivered Online On Demand3 hours 10 minutes
£22.99

Network Fundamentals and Implementing TCP/IP

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for students who want to gain knowledge of basic networking components, TCP/IP, and related services Overview Upon successful completion of this course, students will be able to identify different types of networks, understand TCP/IP protocols, subnetting, name resolution, and configuring various related services This course will introduce students to different types of network environments, understand the processes involved with TCP/IP-based networking, and installing and configuring related services such as DHCP, DNS, Active Directory, and VPNs Basic Network Infrastructure Network Architecture Standards Local Area Networking Wide Area Networking Wireless Networking Connecting Network Devices OSI Model Networking Hardware Introduction to TCP/IP History of TCP/IP TCP/IP Terminology TCP/IP Components in Windows Architectural Overview of TCP/IP TCP/IP Protocol Suite Internet Layer Protocols Transport Layer Protocols IP Addressing IPv4 Addressing IPv6 Addressing Subnetting Subnetting for IPv4 Subnetting for IPv6 IP Routing IP Routing Overview IPv4 Routing Dynamic Host Configuration Protocol DHCP Overview How DHCP Works Windows-based DHCP DHCP Relay Agent Host Name Resolution TCP/IP Naming Schemes Name Resolution Process Domain Name System Overview The Domain Name System Name Resolution Name Server Roles Resource Records Zone Transfers Windows Support for DNS Active Directory Fundamentals DNS Server in Windows Active Directory Integration Windows Internet Name Service Introduction to WINS How WINS Works WINS Client and Server Configuration Virtual Private Networking Virtual Private Networking Overview VPN Protocols VPN Server Installation Troubleshooting TCP/IP Basic Steps Windows Troubleshooting Tools Troubleshooting IPv4 Additional course details: Nexus Humans Network Fundamentals and Implementing TCP/IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Fundamentals and Implementing TCP/IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Fundamentals and Implementing TCP/IP
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues Lesson 10: Configuring Windows Topic 10A: Configure Windows User Settings Topic 10B: Configure Windows System Settings Lesson 11: Managing Windows Topic 11A: Use Management Consoles Topic 11B: Use Performance and Troubleshooting Tools Topic 11C: Use Command-line Tools Lesson 12: Identifying OS Types and Features Topic 12A: Explain OS Types Topic 12B: Compare Windows Editions Lesson 13: Supporting Windows Topic 13A: Perform OS Installations and Upgrades Topic 13B: Install and Configure Applications Topic 13C: Troubleshoot Windows OS Problems Lesson 14: Managing Windows Networking Topic 14A: Manage Windows Networking Topic 14B: Troubleshoot Windows Networking Topic 14C: Configure Windows Security Settings Topic 14D: Manage Windows Shares Lesson 15: Managing Linux and macOS Topic 15A: Identify Features of Linux Topic 15B: Identify Features of macOS Lesson 16: Configuring SOHO Network Security Topic 16A: Explain Attacks, Threats, and Vulnerabilities Topic 16B: Compare Wireless Security Protocols Topic 16C: Configure SOHO Router Security Topic 16D: Summarize Security Measures Lesson 17: Managing Security Settings Topic 17A: Configure Workstation Security Topic 17B: Configure Browser Security Topic 17C: Troubleshoot Workstation Security Issues Lesson 18: Supporting Mobile Software Topic 18A: Configure Mobile OS Security Topic 18B: Troubleshoot Mobile OS and App Software Topic 18C: Troubleshoot Mobile OS and App Security Lesson 19: Using Support and Scripting Tools Topic 19A: Use Remote Access Technologies Topic 19B: Implement Backup and Recovery Topic 19C: Explain Data Handling Best Practices Topic 19D: Identify Basics of Scripting Lesson 20: Implementing Operational Procedures Topic 20A: Implement Best Practice Documentation Topic 20B: Use Proper Communication Techniques Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered OnlineFlexible Dates
£2,475

Network Hacking Training

5.0(1)

By Course Gate

The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.  By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. Who is this course for? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Network Hacking Training
Delivered Online On Demand5 hours 2 minutes
£11.99