• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9184 Network courses

CompTIA Training - CPD Accredited

4.9(27)

By Apex Learning

Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Save Up To £4,169 and get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This bundlewill provide you with the essential knowledge and skills required to shine in your professional career. Whether you want to develop skills for your next job or want to elevate skills for your next promotion, this CompTIA & Network Security will help you keep ahead of the pack. This bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can reinforce your professional skills and essential knowledge, reaching out to the level of expertise required for your position. Further, this bundle will add extra value to your resume to stand out to potential employers. Along with this course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. What other courses are included in this CompTIA & Network Security Bundle? Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA A+ (220-1001) Course 03: CompTIA A+ (220-1002) Course 04: CompTIA Network (N10-007) Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA Security+ (SY0-601) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA PenTest+ (Ethical Hacking) Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: Linux for Absolute Beginners! So, enrol now to advance your career in Network Security! How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Course Curriculum Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) How People Use Computers Introduction to IT Fundamentals The Case for Computer Literacy Features Common to Every Computing Device Common General-Purpose Computing Devices Networks of Computing Devices Remotely-Accessed Computer Systems Specialized Computer Systems Specialty I/O Devices System Hardware CPUs Passive and Active Cooling RAM and Active Memory Motherboards Power Supplies AMA - Ask Me Anything about System Hardware Device Ports and Peripherals Ports and Connectors General Use I/O Devices AMA - Ask Me Anything about I/O, Ports and Peripherals Data Storage and Sharing Basics of Binary Storage Technologies Mass Storage Variation AMA - Ask Me Anything about Data Storage and Sharing Understanding Operating Systems Operating System Functions Operating System Interfaces AMA - Ask Me Anything about Understanding OS's Setting Up and Configuring a PC Preparing the Work Area Setting up a Desktop PC Completing PC Setup AMA - Ask Me Anything about Setting up and Configuring a PC Setting Up and Configuring a Mobile Device Personalizing a Tablet AMA - Ask Me Anything about Mobile Devices Part 1 AMA - Ask Me Anything about Mobile Devices Part 2 Managing Files File Management Tools File Manipulation Backups AMA - Ask Me Anything about Managing Files Using and Managing Application Software Walking Survey of Applications Managing Applications Applications and Extensions AMA - Ask Me Anything about Working with Applications Configuring Network and Internet Connectivity Wi-Fi Setup Going High Speed Setting Up and Sharing Printers AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 IT Security Threat Mitigation Physical Security Dealing with Malware Password Management Clickworthy Perils of Public Internet AMA - Ask Me Anything about IT Threat Mitigation Part 1 AMA - Ask Me Anything about IT Threat Mitigation Part 2 Computer Maintenance and Management Power Management Cleaning and Maintaining Computers Trash it or Stash it? AMA - Ask Me Anything about Computer Maintenance and Management IT Troubleshooting Troubleshooting 101 AMA - Ask Me Anything about Troubleshooting Computers Part 1 AMA - Ask Me Anything about Troubleshooting Computers Part 2 Understanding Databases Introduction to Databases Database Details AMA - Ask Me Anything about Databases Developing and Implementing Software Introduction to Programming Programming with a PBJ Sandwich AMA - Ask Me Anything about Programming CPD 170 CPD hours / points Accredited by CPD Quality Standards Requirements There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various CPD certificate will increase the value in your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (CompTIA IT Fundamentals ITF+ (FCO-U61)) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

CompTIA Training - CPD Accredited
Delivered Online On Demand
£53

Information and Communication Technology (ICT)

By The Teachers Training

Information and Communication Technology (ICT) is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Information and Communication Technology (ICT) and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 5 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Section 01: Introduction Introduction 00:06:00 What is ICT? 00:05:00 Hardware and Software 00:08:00 Information Processing Cycle 00:05:00 Software Explained 00:06:00 Human-Computer -Interface 00:07:00 Section 02: Impact of Emerging Technologies Introduction-Impact of Emerging Technology 00:01:00 Artificial intelligence 00:03:00 Biometrics 00:03:00 Vision enhancement 00:02:00 Robotics 00:03:00 Quantum cryptography 00:03:00 Computer-assisted translation 00:02:00 3D and holographic imaging 00:03:00 Virtual reality 00:06:00 Section 03: Types of Input Devices Types of Input Devices - Introduction 00:02:00 Manual input 00:07:00 Pointing devices 00:12:00 Inputting Images Devices 00:08:00 Inputting Sound & Music Devices 00:05:00 Direct input systems 00:07:00 Direct Input systems Part-2 00:05:00 Direct Input Systems Part-3 00:06:00 Direct Input Systems devices. Part-4 00:04:00 Sensors 00:05:00 Section 04: Types of Output Devices Types of Input Devices - Introduction 00:02:00 Monitors 00:06:00 Printers 00:08:00 Plotters 00:03:00 3D Printers 00:04:00 Speakers 00:02:00 Control Devices 00:06:00 Section 05: Storage Devices and Media Types of Storage Devices and Media 00:06:00 Magnetic Media 00:06:00 Optical media 00:10:00 Solid-State media 00:04:00 Backups 00:02:00 Section 06: Networks WHAT IS COMPUTER COMMUNICATION? 00:02:00 What is a computer network? 00:07:00 Types of NETWORK- Local Area Network 00:07:00 Wide Area Network 00:07:00 Bluetooth and WI-FI in Networks 00:07:00 Network Hardware 00:03:00 Network Switch 00:05:00 Network Bridge 00:02:00 Networking Hardware Router 00:05:00 Modem 00:04:00 Network Cables 00:03:00 How to set up a small network? 00:07:00 Section 07: Database What is a Database? 00:03:00 Database File 00:04:00 Database Types 00:09:00 Using Database 00:06:00 Data validation and verification 00:10:00 Section 08: Expert Systems What is an expert system? 00:10:00 Section 09: ICT Applications Applications in Banking: ATM, Electronic Fund Transfer 00:04:00 Applications in Banking: Internet Banking Telephone Banking 00:04:00 Applications in Banking: Cheque Clearing 00:05:00 RETAIL INDUSTRY Applications: POS 00:05:00 Retail: Stock Control 00:04:00 Retail: Automatic Reordering of Stock 00:03:00

Information and Communication Technology (ICT)
Delivered Online On Demand5 hours 9 minutes
£27.99

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Cisco Meeting Server Overview Cisco Meeting Server Deployment Cisco Meeting Server User Licensing Cisco Meeting Server Configuration Cisco Meeting Server Configuration with Cisco Unified Communication Manager (CUCM) Cisco Meeting Server Integration VCS/Expressway Cisco Meeting Server Integration with TMS Cisco Meeting Server Configuration with Lync/Skype for Business Cisco Meeting Server Recording and Streaming Cisco Meeting Manager (CMM) Deployment Cisco Meeting Server WebRTC using Expressway Proxy Cisco Meeting Server Customization Cisco Meeting Server Troubleshooting In this course, students will install and configure a Cisco Meeting Server version 2.x. Students will configure a multimode CMS Cluster and implement all the different components of a clustered solution. Student will also integrate CMS with Unified Communications Manager and VCS/Expressway. Students will also integrate Recording and Skype/Lync. Students will use the TMS and new Cisco Meeting Manager Schedule and monitor CMS. Cisco Meeting Server Overview What is Cisco Meeting Server Cisco Meeting Server Benefits Cisco Meeting Server vs Telepresence Server vs MCU Cisco Meeting Server Functions? Cisco Meeting Server Components Cisco Meeting Server Call Bridge Cisco Meeting Server Web Bridge Cisco Meeting Server Turn Server Cisco Meeting Server XMPP Server Cisco Meeting Server Database Cisco Meeting Server Scalability On-premises and Cloud Conferencing API Integration Cisco Meeting Server Deployment MMP CLI Cisco Meeting Server Prerequisites Cisco Meeting Server 2000 Deployments Installing the server Configuring the Fabric Interconnect modules Configuring the Cisco Meeting Server 2000 through the MMP Checking the installed software Configuring the Web Admin Interface Applying a License File Cisco Meeting Server 1000/VM Deployments Installing CMM via VMware Configuring VMware Network Management Configuring the VMware Instance using vSphere client Retrieving and activating VMware Licenses Accessing the Cisco Meeting Server 1000 Console Installing CMM via Hyper-V Single combined server deployment Single Split Server Deployment Deploying a Core Server Deploying an Edge Server Certificate Guidelines for Single Split Server Deployment Scalable and Resilient Server Deployments Cisco Meeting Server User Licensing Obtaining and Entering a License File Cisco Meeting Server Licenses Cisco User Licenses Personal Multiparty Plus Licensing Shared Multiparty Plus Licensing Cisco Meeting Server Capacity Units XMPP Licensing for Cisco Meeting Apps Cisco Meeting Server Capacity Units Cisco Meeting Server Configuration Transferring the License File to the Cisco Meeting Sever Creating a Cisco Meeting Server Administrator Account Setting up the Network Interface for IPv4 Adding additional Network Interfaces Configuring the Web Admin Interface Creating the certificate for the Web Admin Interface Configuring the Web Admin Interface for HTTS Access Configuring the Web Bridge Configuring the TURN server Configuring the Databases Deploying Web Bridges Deploying multiple Web Bridges Setting up the Web Bridges? certificates Setting up the Web Bridges via the API Web Bridge call flow Cisco Meeting App and WebRTC Client Enabling HTTP redirect and the Web Bridge Deploying the TURN Servers Dial plan configuration ? Overview Dial plan rules for incoming calls and outbound calls Outbound Dial Plan Rules Inbound Dial Plan Rules Forwarding Dial Plan Rules Dial plan configuration?SIP endpoints Cisco Meeting Server (CMS) Configuration with Cisco Unified Communication Manager (CUCM) CUCM and CMS Integration Setting up Escalated ad hoc calls Configuring the Meeting Server Setup Incoming Dial Plan Setup Administrator Account with API Permission Adding the Cisco Meeting Server as a Conference Bridge Creating a Media Resource Group Creating a Media Resource List Adding the Media Resource Group to a Device Pool or Device Setting up Scheduled and Rendezvous Calls Configure Outbound Dial Plan Dial Plan Configuring Cisco Unified Communications Server Configure Route Groups Configure Route Lists Configure Route Pattern Support for Active Control Participant List Indicators Selecting Layout Limitations Overview of ActiveControl and the iX protocol CUCM 8.x and earlier Third-party networks VCS-centric deployments Load Balancing Calls Configuring Call Bridges for Load Balancing Incoming Calls Creating Call Bridge Groups Enabling Load Balancing Fine Tuning Load Balancing Enable Load Balancing of Outbound SIP Calls Setup Outbound Dial Plan Rule for Load Balancing SIP Calls Supply the Call Bridge Group or Specific Call Bridge to Use for Outbound SIP Calls Cisco Meeting Server Integration VCS/Expressway Gateway Configuration Call Testing Inbound call from an endpoint registered to a VCS/Expressway Outbound call to an endpoint registered to a VCS/Expressway Calling non Cisco Meeting App users from H.323 endpoint Troubleshooting Cisco Meeting Server Integration with TMS TMS Integration Cisco Meeting Server Configuration with Lync/Skype for Business Configuring Cisco Meeting Server with SKYPE Dial plan configuration ? integrating Lync/Skype for Business Lync clients dialing into a call on clustered Meeting Servers Integrating SIP endpoints and Lync clients Adding calls between Lync clients and SIP video endpoints Lync Front End server configuration VCS configuration Meeting Server configuration Integrating Cisco Meeting App with SIP and Lync clients Integrating Lync using Lync Edge service Controlling the bandwidth for sharing content on Microsoft Lync and Skype for Business calls Direct Lync federation Calling into scheduled Lync meetings directly and via IVR Office 365 Dual Homed Experience with OBTP Scheduling Cisco Meeting Server Recording and Streaming Recording Meetings Recorder licensing Recording with Vbrick Prerequisites for the Meeting Server Configuring the Meeting Server to work with Vbrick Steps to configuring the Streamer Deploying streaming Streamer licensing Recording meetings Cisco Meeting Manager (CMM) Deployment Deploy Cisco Meeting Manager Cisco Meeting Manager Meetings Navigation List Meetings Edit Meetings Layout Recording Streaming Participants Find meetings Find participants Change layout for all participants in a meeting Start and stop recording Start and stop streaming Add participants Change layout for an individual participant Turn audio or video on or off View participant details Call statistics Cisco Meeting Server WebRTC using Expressway Proxy Configure Cisco Meeting Server for WebRTC Proxy Configure Cisco Expressway C Configure Turn on Cisco Expressway E Cisco Meeting Server Customization WebRTC App Customization Call Customization IVR Message Customization SIP/LYNC Call Message Customization Invitation Customization Cisco Meeting Server Troubleshooting Troubleshooting Cisco Meeting Server Connectivity Troubleshooting Web Bridge connectivity Troubleshooting Call Server issues Troubleshooting Conferencing issues

ICMCMS-CT-Implementing, Configuring and Managing Cisco Meeting Server
Delivered OnlineFlexible Dates
Price on Enquiry

CCCS Check Point Certified Cloud Specialist-Administrator

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.

CCCS Check Point Certified Cloud Specialist-Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Level 5 Diploma in IT - Web Design

4.0(2)

By London School Of Business And Research

The rationale for the Level 5 Diploma in IT - Web Design qualification (Accredited by Qualifi, UK) is that it provides a career path for learners who wish to develop a broad base of knowledge and skills that will enable them to work in a variety of roles n the IT industry, notably in .NET programming, system administration and network security. Learners will also learn about entrepreneurship in a techno environment. The Level 5 Diploma in IT - Web Design qualification is flexible in that it offers elective choices of networking, web design or e-commerce - the latter being much in demand in modern business. The technical skills and knowledge delivered through the successful achievement of the qualification are required and recognised internationally. The diploma is accredited at Level 5 and has a total equivalence of 120 credits. Key Highlights of this Level 5 Diploma in IT - Web Design qualification are: Program Duration: 9 Months (Fast track 6 months duration mode Available) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements This Level 5 Diploma in IT - Web Design (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 4 OR A Level 5 qualification in another discipline and want to develop their careers in business and entrepreneurship. Career path Learners completing the Level 5 Diploma in IT - Web Design progress to: Final year of Undergraduate study, or Level 6 Diploma in Information Technology, or BSc (Hons) in Business Computing and Information Systems degree, or Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge.

Level 5 Diploma in IT - Web Design
Delivered Online On Demand
£1,499

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

4.9(27)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

CompTIA PenTest+ (Ethical Hacking)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Learn Ethical Hacking From A-Z: Beginner To Expert

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£12

IT Security Specialist Bundle (30 in 1)

By NextGen Learning

Get ready for an exceptional online learning experience with the IT Security Specialist bundle! This carefully curated collection of 30 premium courses is designed to cater to a variety of interests and disciplines. Dive into a sea of knowledge and skills, tailoring your learning journey to suit your unique aspirations. The IT Security Specialist is a dynamic package, blending the expertise of industry professionals with the flexibility of digital learning. It offers the perfect balance of foundational understanding and advanced insights. Whether you're looking to break into a new field or deepen your existing knowledge, the IT Security Specialist package has something for everyone. As part of the IT Security Specialist package, you will receive complimentary PDF certificates for all courses in this bundle at no extra cost. Equip yourself with the IT Security Specialist bundle to confidently navigate your career path or personal development journey. Enrol today and start your career growth! This Bundle Comprises the Following IT Security Specialist CPD Accredited Courses: Course 01: IT Administration and Networking Course 02: Start an IT Asset Department Course 03: IT Helpdesk Administrator Training Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 05: CompTIA Network+ Certification (N10-007) Course 06: Information Management Course 07: IT For Recruiters Course 08: The Complete Front-End Web Development Course! Course 09: Data Science & Machine Learning with R from A-Z Course 10: SQL for Data Science, Data Analytics and Data Visualization Course 11: Masterclass Bootstrap 5 Course - Responsive Web Design Course 12: Web Application Penetration Testing Course Course 13: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Computer Networks Security from Scratch to Advanced Course 16: Learn Ethical Hacking From A-Z: Beginner To Expert Course 17: SQL Database Basics for Everyone Course 18: GDPR Course 19: Cyber Security Incident Handling and Incident Response Course 20: Digital Product Management Course 21: Career Development Plan Fundamentals Course 22: CV Writing and Job Searching Course 23: Learn to Level Up Your Leadership Course 24: Networking Skills for Personal Success Course 25: Ace Your Presentations: Public Speaking Masterclass Course 26: Learn to Make a Fresh Start in Your Life Course 27: Motivation - Motivating Yourself & Others Course 28: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 29: Decision Making and Critical Thinking Course 30: Time Management Training - Online Course What will make you stand out? Upon completion of this online IT Security Specialist bundle, you will gain the following: CPD QS Accredited Proficiency with this IT Security Specialist bundle After successfully completing the IT Security Specialist bundle, you will receive a FREE CPD PDF Certificates as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this IT Security Specialist bundle The online test with immediate results You can study and complete the IT Security Specialist bundle at your own pace. Study for the IT Security Specialist bundle using any internet-connected device, such as a computer, tablet, or mobile device. Each course in this IT Security Specialist bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This bundle promises not just education but an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Embrace the future of learning with the IT Security Specialist, a rich anthology of 30 diverse courses. Each course in the IT Security Specialist bundle is handpicked by our experts to ensure a wide spectrum of learning opportunities. ThisIT Security Specialist bundle will take you on a unique and enriching educational journey. The bundle encapsulates our mission to provide quality, accessible education for all. Whether you are just starting your career, looking to switch industries, or hoping to enhance your professional skill set, the IT Security Specialist bundle offers you the flexibility and convenience to learn at your own pace. Make the IT Security Specialist package your trusted companion in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The IT Security Specialist bundle is perfect for: Lifelong learners looking to expand their knowledge and skills. Professionals seeking to enhance their career with CPD certification. Individuals wanting to explore new fields and disciplines. Anyone who values flexible, self-paced learning from the comfort of home. Requirements You are cordially invited to enroll in this IT Security Specialist bundle; please note that there are no formal prerequisites or qualifications required. We've designed this curriculum to be accessible to all, irrespective of prior experience or educational background. Career path Unleash your potential with the IT Security Specialist bundle. Acquire versatile skills across multiple fields, foster problem-solving abilities, and stay ahead of industry trends. Ideal for those seeking career advancement, a new professional path, or personal growth. Embrace the journey with the IT Security Specialistbundle package. Certificates CPD Quality Standard Certificate Digital certificate - Included 30 CPD Quality Standard Certificates - Free

IT Security Specialist Bundle (30 in 1)
Delivered Online On Demand5 days
£199

EIGRP Comprehensive Labs Training

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 3 Hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about networking Understand the core competencies and principles of networking Explore the various areas of networking Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert networking engineer EIGRP Comprehensive Labs Training Course Master the skills you need to propel your career forward in networking. This course will equip you with the essential knowledge and skillset that will make you a confident networking engineer and take your career to the next level. This comprehensive EIGRP comprehensive labs course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this EIGRP comprehensive labs course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective networking practice and equip you with the essential skills, confidence and competence to assist you in the networking industry. You'll gain a solid understanding of the core competencies required to drive a successful career in networking. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for networking engineer or for people who are aspiring to specialise in networking. Enrol in this EIGRP comprehensive labs course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive EIGRP comprehensive labs course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this networking can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This EIGRP comprehensive labs course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This EIGRP comprehensive labs course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This EIGRP comprehensive labs course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction to the EIGRP Comprehensive Labs Introduction To The Course 00:01:00 Basic EIGRP Configuring the Basics of EIGRP 00:16:00 Configuring EIGRP For IPv6 00:21:00 Configuring DUAL STACK using EIGRP 00:29:00 Advanced EIGRP Configurations Load Balancing Using The Variance Commands 00:23:00 Manipulating Bandwidth within EIGRP 00:23:00 Configuring EIGRP using Wildcard Mask 00:08:00 Redistribution of EIGRP Redistribute EIGRP between Different Autonomous Systems 00:25:00 Redistribute EIGRP into OSPF 00:22:00 Redistribute EIGRP into RIP 00:11:00 Assessment Assessment - EIGRP Comprehensive Labs Training 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

EIGRP Comprehensive Labs Training
Delivered Online On Demand
£19