• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

106 Physical Security courses

Level 5 Diploma in Computer Networks Security

By Compliance Central

Cybersecurity whispers in hushed tones - a dark underbelly to the bright, interconnected world we inhabit. It's a realm of shadows and shields, where digital predators lurk and networks stand as the battlefield. But what if you could become the protector, the architect of fortresses that hold back the tide of digital darkness? This Level 5 Diploma in Computer Networks Security is your gateway to that world. It's more than just knowledge; it's a weapon forged in understanding, honed by logic, and wielded with the precision of a digital warrior. You'll delve into the very core of networks, dissecting their anatomy, understanding their language (think TCP/IP, the Esperanto of data), and mastering the intricacies of security protocols like firewalls and honeypots. This isn't a playground for casual observers; it's a training ground for elite defenders. You'll navigate the labyrinthine pathways of the ISO/OSI model, unveil the secrets of wireless networks, and learn to anticipate the moves of your adversaries in the intricate game of intrusion detection. Physical security, incident handling - no stone is left unturned in this comprehensive odyssey. So, unsheathe your curiosity, lace up your digital boots, and prepare to conquer the ever-evolving realm of computer networks security in this comprehensive diploma. Level 5 Diploma in Computer Networks Security Course Learning Outcomes Craft an intricate understanding of network architecture and protocols. Decipher the layers of the ISO/OSI and TCP/IP models, the blueprints of secure networks. Master the art of securing both wired and wireless networks, leaving no vulnerability unguarded. Become a firewall architect, wielding these digital shields to deflect malicious attacks. Craft a strategic defense against intruders, deploying intrusion detection and prevention systems. Navigate the complex terrain of physical security and incident handling, ensuring airtight network protection. Level 5 Diploma in Computer Networks Security Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for Free to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Who is this course for? Level 5 Diploma in Computer Networks Security Network Security Analyst Cybersecurity Specialist IT Security Consultant Penetration Tester Ethical Hacker Cloud Security Architect Requirements Level 5 Diploma in Computer Networks Security To enrol in this Level 5 Diploma in Computer Networks Security, Purchasing & Procurement course, all you need is a basic understanding of the English Language and an internet connection. Career path Level 5 Diploma in Computer Networks Security Network Security Analyst: £30,000 to £60,000 per year Cybersecurity Consultant: £40,000 to £70,000 per year IT Security Engineer: £35,000 to £65,000 per year Information Security Officer: £40,000 to £75,000 per year Penetration Tester (Ethical Hacker): £35,000 to £70,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Level 5 Diploma in Computer Networks Security
Delivered Online On Demand8 hours
£109

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Ultimate Linux Security and Hardening Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Ultimate Linux Security and Hardening Training
Delivered Online On Demand4 hours 12 minutes
£25

Linux Security and Hardening

4.5(3)

By Studyhub UK

The 'Linux Security and Hardening' course focuses on strengthening the security measures of Linux systems. It covers various aspects of security, including general security practices, physical security, account security, network security, and file system security. Learners will gain valuable knowledge and techniques to enhance the security of Linux environments. Learning Outcomes: Understand the importance of Linux security and its significance in protecting systems and data. Implement general security best practices, including updates, patches, and system configurations. Secure physical access to Linux servers and prevent unauthorized access. Manage user accounts and permissions effectively to maintain a secure environment. Apply network security measures, including firewalls, to safeguard against external threats. Set up file system security and encryption to protect sensitive data. Explore additional resources for continuous learning and staying up-to-date with Linux security practices. Why buy this Linux Security and Hardening? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Linux Security and Hardening there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Linux Security and Hardening course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Linux Security and Hardening does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux Security and Hardening was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Linux Security and Hardening is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment - Linux Security and Hardening 00:00:00

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£10.99

Cyber Security Awareness Training for Employees

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Overview Course Overview 00:04:00 Why Should You Care About Cybersecurity? Why Should You Care About CyberSecurity 00:03:00 Social Engineering What is Phishing and How Does it Work 00:08:00 What is Spear Phishing 00:03:00 What is Vishing and How Does it Work 00:04:00 Malware Malware - What is It and What Can it Do 00:02:00 How Can You Get Infected 00:02:00 How to Protect Against Malware 00:03:00 How Can You Tell if Your PC Infected 00:04:00 First Steps if You Realize You Have been Infected 00:01:00 How to Remove Malware from Your PC 00:02:00 Password Management What is Wrong with Your P@ssw0rd 00:05:00 Password Management Tools 00:04:00 Two-Factor Authentication 00:05:00 Use the Internet Securely Use Wireless Devices securely 00:04:00 Browse the Internet Securely 00:05:00 Maintain Physical Security Maintain Physical Security 00:03:00 Moving Forward Review and Suggestions to Stay Cyber Save 00:02:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security Awareness Training for Employees
Delivered Online On Demand
£19

Linux Security and Hardening

5.0(10)

By Apex Learning

Overview This comprehensive course on Linux Security and Hardening will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Linux Security and Hardening comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Linux Security and Hardening. It is available to all students, of all academic backgrounds. Requirements Our Linux Security and Hardening is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 52 lectures • 04:17:00 total length •Course Overview: 00:01:00 •Section Overview - General Security: 00:01:00 •Is Linux Secure?: 00:02:00 •What Makes Linux Secure?: 00:08:00 •Security Guidelines and Principles: 00:08:00 •Section Summary - General Security: 00:02:00 •Section Overview - Physical Security: 00:01:00 •Physical Security Concepts: 00:08:00 •Single User Mode Security: 00:07:00 •Single User Mode and Blank Passwords: 00:03:00 •Securing the Boot Loader: 00:07:00 •Disk Encryption: 00:06:00 •Encrypting a New Device, Part I: 00:09:00 •Encrypting a New Device, Part II: 00:04:00 •Encrypting an Existing Device: 00:01:00 •Disabling Control Alt Delete: 00:02:00 •Section Summary - Physical Security: 00:01:00 •Section Overview - Account Security: 00:01:00 •Intro to PAM: 00:05:00 •PAM Configuration Example: 00:04:00 •Password Security: 00:08:00 •Account Security Demo #1 (UID 0): 00:03:00 •Controlling Account Access: 00:05:00 •Security by Account Type: 00:06:00 •Account Security Demo #2: 00:03:00 •Account Security Demo #3 (Sudo): 00:05:00 •Section Overview - Network Security: 00:01:00 •Network Security, Part I: 00:08:00 •Network Security, Part II: 00:06:00 •Securing SSHD, Part I: 00:08:00 •Securing SSHD, Part II: 00:03:00 •Linux Firewall Fundamentals: 00:08:00 •Configuring the Firewall from the Command Line: 00:04:00 •Firewall Rule Specifications: 00:05:00 •Example Firewall Rules: 00:04:00 •Linux Firewall Demonstration: 00:10:00 •TCP Wrappers, Part I: 00:07:00 •TCP Wrappers, Part II: 00:04:00 •Section Overview - File System Security: 00:01:00 •File and Directory Permissions, Intro: 00:01:00 •File and Directory Permissions, Part I: 00:11:00 •File and Directory Permissions, Part II: 00:09:00 •Special Modes, Part I: 00:08:00 •Special Modes, Part II: 00:03:00 •File Attributes: 00:06:00 •File Attributes Demo: 00:03:00 •ACLs: 00:09:00 •ACLs Demo: 00:06:00 •Rootkits: 00:09:00 •Rootkit Hunter Demonstration: 00:07:00 •Additional Resources: 00:05:00 •Assignment - Linux Security and Hardening: 00:00:00

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£12

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Linux Security and Hardening

4.7(160)

By Janets

Description Register on the Linux Security and Hardening today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Linux Security and Hardening course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Course Content Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Protected: Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Protected: Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Protected: Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Protected: Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 Protected: File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 Protected: File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment -Linux Security and Hardening 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£25

Cyber security Course for Beginners

5.0(1)

By LearnDrive UK

"Empower yourself with our Cybersecurity: Understand Threats and Prevent Attacks course. Gain vital insights into cybersecurity threats and effective prevention strategies to safeguard your digital assets."

Cyber security Course for Beginners
Delivered Online On Demand1 hour
£5