• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

38 Educators providing Security courses in Lydney

Sarah Bolton-Locke

sarah bolton-locke

0.0(2)

Flaxley

Hello, welcome to my page, you will find more information about me personally and professionally here. I am very passionate about inspiring others, reaching out and supporting people in a therapeutic way that suits them, their lifestyle and their individual needs. I am a very warm and friendly person, I work relationally, therefor the therapeutic relationship is important to me and I like to ensure that whom I am supporting has the space needed to explore and unwind what is troubling them. I have my own therapy space at Essential Space, this is a Communtiy Interest Company that I co-direct offering pay-what-you-can counselling and creative mentoring. You can find out more about the therapy services on the website www.essentialspace.co.uk. I am also happy to see or meet clients for 1-1 and group sessions in GP surgeries, community centres and in schools if required, and hold an enhanced DBS clearance certificate and have up-to-date Safeguarding policies and certificates. I became the founder of A space 2 Be in October 2018, over the last 28 years I have been extending my qualifications and experience to offer both adult and children's Counselling. I began Reflective & Clinical Supervision for staff working with adults in the community and in private practice, and counsellors supporting children, young people, families, and or GSRD clients. I have had counselling myself, this was a time of self-development that set me on a path, I left school and became a health practitioner, working in an institution and completing a college course in Health and Social Care. I specialised in early years and had a placement in a school, this is where I discovered a connection with young people and adults with learning differences. My career went on to working and supporting adults with rehabilitation. After becoming a mum of three children I took on the challenge of managing a well-being centre called the Isbourne in Cheltenham town centre, it was there that I realised how beneficial therapies are for supporting both physical health and mental health. I completed the mental health first aid certificates and began my counselling training. I have supported hidden victims of crime with a charity, Infobuzz. This role introduced me to working in a crisis support team, supporting families in the community and working within the criminal justice system and running creative art workshops in prison. I volunteered with Young Gloucestershire supporting their counselling service and this allowed me to extend my experience to working with young adults who were struggling with life's challenges. My adventures have continued into gaining certificates in 'Stress Less Mindfulness' and running adult sound retreats. I have naturally entwined mindfulness into my personal and professional life and have found the benefits have been endless. I have been able to share these skills with all of my clients as a mindful mindset works for anyone, anywhere and at any age! When I am not with someone in a 1-1 Counselling session, you will find me delivering training to professionals or facilitating sound baths and retreats. Most of my events are therapeutic and developed for deepening awareness with a chance to focus and recharge.

Property SQ2

property sq2

BEST PRACTICE TRAINING IN THE PROPERTY INDUSTRY   Property SQ2 Limited is a leading provider of online education and training courses related to the property business.  We proud members of the Property Educators Accreditation Scheme. Between us we have 25 years experience in Property Investment and the Property Industry, and over 20 years experience training people in skills and techniques for best practice in the industry via a combination of face to face, live online, on demand and 1-2-1 training events. TAKE CONTROL OF YOUR FINANCIAL FUTURE From building a retirement pot, to replacing your current income. Property is the vehicle to create financial freedom, choice and security Drawing on over 30 years of property and business experience with over 20 years of training, coaching and mentoring people in property investment strategies,  Our training courses and 1-2-1 coaching and mentoring solutions are here to help you succeed in the property business. Whatever your goal, whatever your background, whatever your experience. Whether you want to... * Build a safe and sustainable portfolio to bolster your retirement pot * Create a passive income to generate job-leaving level profits * Learn how to add value and recycle your precious savings through multiple property deals * Need a way into the property industry without a big deposit we can help. ARDEN HANLEY                                                                          Arden Hanley is a property investor, business owner, consultant and trainer. Having experience across multiple property investment strategies and related businesses such as lettings management, sourcing and property consultancy. A landlord and business owner for 20 years, trainer, mentor and coach to the property industry for 12 years, member of the Property Educators Accreditation scheme, Arden has not only extensive experience in the industry, but also a track record of using that experience to train others to achieve their property goals. Buy To Let & Social Housing  With previous buy-to-let experience in Australia, Arden was immediately drawn to this as a primary strategy. Today, Arden has an extensive buy to let portfolio in the UK that he has built in Northampton, Nottingham and Hull. He has a range of houses for family lets, rented to both working tenants and within the social housing sector, and flats serving the young professional market. Arden says, “I think buy to let is the foundation of any successful property portfolio and this part of my portfolio was what allowed me to first achieve financial freedom. I think every investor needs to learn the fundamentals of buy to let, even if they ultimately choose to focus on other strategies within their portfolio because there are so many simple but important lessons to learn around being a good landlord and managing tenants effectively that you get from understanding this core strategy.”  HMO & Rent To Rent                         HMO was a natural progression from initial Buy to Let purchases to “increase my cash flow and take advantage of market conditions in my target area at that time being Nottingham.” With an extensive HMO portfolio, his preference are a larger number of smaller HMOs i.e. 4-6 tenants rather than a smaller number of large HMOs, although he has experience of both. How can an investor make this strategy work for them? “I believe HMO provides an excellent income stream and if done correctly can be a very stable income stream as well. I think the key to a successful HMO is setting it up correctly from the outset to make it as attractive and user friendly for tenants, and identify potential cost centres or savings before tenants go in and empowering my lettings agents to put together the right tenant mix to create a harmonious environment.”  Distressed Property & Adding Value  Every property that Arden has purchased has been distressed to some degree, as he says “I believe this is the one true route to make money out of property.” He has applied the lessons he has learnt on smaller projects as he has moved on to larger more complex investment properties. It’s also given him the opportunity to work with distressed sellers which he regards as a core skill in a property investor’s arsenal. As Arden says, “With a distressed seller, you are a solution provider trying to create a win/win situation where you can offer a route for the seller to sell the property that removes their financial burden, while at the same time offering an opportunity for you as an investor to make a fair profit.”  Commercial to Residential & Development                         As his confidence has grown, so has Arden’s willingness to commit to more complicated projects and he has successfully adopted commercial to residential conversions as a strategy since 2013 primarily working with either disused retail or office space which is in abundance in the UK. It’s not hard to see the appeal, as Arden says, “I find that there is a huge opportunity for value uplift in this strategy as the closer you get to effectively a shell, the more opportunities you have to make money.’                     Portfolios                    There are a number of options for approaching the acquisition of a portfolio, whether it’s title splitting a block of flats, via a freehold/leasehold strategy, organising a share buyout of a property company, or structuring a staggered sale to maximise buyer and seller value and tax savings. Arden has experience dealing with the simple acquisition of a portfolio to the complex and sometimes challenging world of dealing with portfolios in trouble, direct to owners, via agents, liquidators or administrators.                     Complimentary businesses and deal structuring  Having an interest in a lettings agency, experience running a sourcing business/property consultancy for 7 years and working with multiple business partners has taught Arden the value of building business clusters to support each other and working with business partners and private investors to make business happen. ‘Property deals can come together from your own resources, time and effort, but as your ambitions grow and the opportunities get bigger, it’s important to think about how private finance and joint ventures can create profit for you and your partners. I’d rather have a cut of something than the whole of nothing.’  Mentorship & Training               For Arden, it’s an honour to be invited to mentor to share his knowledge with others which provides enormous, personal satisfaction. Even though he’s not naturally outgoing, Arden admits that “As a self-confessed property geek, if you ask me questions about property, I’m happy to talk for days.” He encourages his mentees to “Soak up as much as you can from people who have done it before and been successful. Soak up the knowledge for sure, but also the motivation and mindset.” He concludes, “I don't think there is any better way to start in property than to work side by side with someone who has been where you are starting from and has proved how to make it work.”  CHRIS CORMACK Chris Cormack is a property investor and business owner with a vast experience working with people to develop their property investments and business growth. Helping people to succeed has been a large part of his business focus over the last 16 years as a mentor, trainer and coach. His understanding of the industry through building his own portfolio across a range of strategies enables him to work with clients around their goals so they achieve whichever outcome they are looking for. Chris is recognised within the property industry and is member of the Property Educators Accreditation scheme. From a standing start in November 2004 Chris built his property business across various strategies within the property industry. Property had a great appeal for 5 reasons: 1. Being his own boss  2. Recurring monthly income  3. Large lump sums of income 4. Long term capital growth 5. Opportunity to help others benefit from the same reasons 1-4. BUY TO LET & SOCIAL HOUSING  Chris believes "Buy To Lets are the foundation to any successful property portfolio because it's the quickest way to generate income while you learn the initial fundamentals of the business. Demand is high across the country for BTL which other strategies don't necessarily have. Within our portfolio we have a wide mix of tenants including families, couples, singles as well as fixed term guaranteed social housing contracts." Understanding the industry and our responsibilities is paramount and gives us the necessary grounding to progress income across other strategies. A number of his properties have been used as serviced accommodation through a commercial contract. These have resulted in guaranteed income, ensuring a hands off pain free outcome. HMO  Chris continues "For larger income, having HMOs brings considerable changes to your monthly bank account which was our natural progression. A major learning moving into HMOs was all the necessary fire requirements and additional management needs. These of course add costs which are not present with your BTL's. Having this knowledge prior to committing to this strategy is important along with a deep understanding of who will be your tenant market. Generally this is less flexibility so more targeted research initially is imperative to achieve your successful outcome. ADDING VALUE & FLIPS Lump sums of income is an area Chris has targeted when buying properties, modernising them and selling them. A key component to achieve these returns is looking to see where true value can be added, increasing value is paramount here. His view on this is that while it generates substantial income it also gives the opportunity to allow faster growth within his portfolio. Having addition capital to invest gives a wider deal choice and opportunities to structure deals. "Having greater tools while in front of a motivated seller allows you the facility to be more creative especially if you can offer a solution to their current situation." STRUCTURING SOLUTIONS  Over the years he has been able to structure deals which has helped the seller which in turn helped him dramatically reduce initial capital to acquire the property. "The key is to focusing on them, the seller and come to a win, win scenario." Achieving this has added numerous properties to the portfolio.  With a deal seeing what is really there gives Chris an edge. Where most people see a single outcome in a deal Chris likes to look for multiple outcomes across strategies. As his experience has developed the confidence has taken him into larger projects which can deliver multiple opportunities. Understanding the finance and tax implication can give additional advantages. Having bought a portfolio with land created multiple flip opportunities which resulted in the land cost him nothing, free land. Having free land gave him further choices around planning. Sell with planning or build out and sell with a decision based on whichever gives the greater return for time/money invested. MENTORSHIP, COACHING AND TRAINING Chris has been mentoring property investors since 2007. He himself had the benefit of a mentor and fully understands how it accelerates your portfolio growth, "money well spent" and that's from a Scotsman....! "It was a privilege to be asked and was something I had wanted to do, so I enthusiastically jumped at the chance." Being able to pass on market experience, as well as working with people to develop the best strategy for them is extremely rewarding. Sometimes it's the smallest thing that creates the biggest impact and it does not matter if you are new or have some experience in property, accessing another person's experience is a springboard to a new set of outcomes, for the better. 

Courses matching "Security"

Show all 354

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626