• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

78 Educators providing Security courses in Horley delivered Online

MyT Automation

myt automation

Croydon

MyT Automation is a comprehensive Software as a Service (SaaS) platform designed to empower businesses, agencies, and entrepreneurs to deliver scalable and efficient solutions for marketing, sales, customer relationship management (CRM), and automation.  The platform consolidates a wide range of tools into a single, customisable system, enabling users to streamline operations, enhance client engagement, and drive revenue growth without the need for extensive development or technical expertise.  Below is a detailed overview of MyT Automation's capabilities, tailored for use by a chatbot or AI agent to communicate its features effectively.  Core Capabilities 1. Marketing Automation MyT Automation provides robust tools to automate and optimise marketing efforts, enabling businesses to engage customers efficiently across multiple channels. Email Marketing Automation:  Create, schedule, and send personalised email campaigns with drag-and-drop editors, pre-built templates, and automated sequences for lead nurturing, follow-ups, and customer retention.SMS Marketing: Send targeted text messages for promotions, reminders, or transactional updates, with support for automated SMS workflows. Social Media Management:  Schedule and publish posts across major social media platforms, with analytics to track engagement and performance. Lead Scoring and Segmentation:  Automatically score leads based on behaviour and demographics, allowing for precise audience segmentation and targeted campaigns. Campaign Analytics:  Access detailed reports on campaign performance, including open rates, click-through rates, and conversions, to optimise marketing strategies. 2. Customer Relationship Management (CRM) The platform includes a powerful CRM system to manage client relationships, streamline sales processes, and enhance customer experiences. Contact Management:  Centralise customer data with detailed profiles, including interaction history, preferences, and purchase records. Pipeline Management:  Visualise and manage sales pipelines with customizable stages, automated deal tracking, and task assignments. Lead Capture and Nurturing:  Use forms, landing pages, and automated workflows to capture leads and guide them through the sales funnel. Appointment Scheduling:  Integrate calendar tools to automate booking, send reminders, and sync with platforms like Google Calendar. Unified Inbox:  Manage all client communications (email, SMS, social media) in a single dashboard for streamlined interactions. 3. Funnel and Website Building MyT Automation offers intuitive tools to create high-converting sales funnels and professional websites without coding expertise. Drag-and-Drop Builder:  Design landing pages, funnels, and full websites using customisable templates and a user-friendly interface. E-commerce Integration:  Build online stores with product management, payment gateways, and order tracking capabilities. SEO Optimisation:  Optimise websites for search engines with built-in tools for meta tags, keywords, and mobile responsiveness. A/B Testing:  Test different versions of pages or funnels to identify the highest-performing designs and content. 4. Conversational AI and Chatbots MyT Automation includes AI-powered chatbot capabilities to enhance customer support and lead generation. No-Code Chatbot Builder:  Create custom chatbots to automate customer interactions, answer FAQs, qualify leads, or book appointments. Multi-Channel Support:  Deploy chatbots on websites, social media, and messaging apps like WhatsApp or Facebook Messenger. Live Chat Handoff:  Seamlessly transition from automated chatbot responses to human agents when needed. Analytics and Insights:  Track chatbot performance, including engagement rates and conversion metrics, to refine conversational strategies. 5. Workflow Automation The platform automates repetitive tasks and workflows to save time and improve efficiency. Trigger-Based Actions:  Set up automated actions based on user behaviour, such as sending follow-up emails when a lead completes a form. Workflow Integrations:  Connect with external tools like CRMs, payment processors, and productivity apps via APIs or third-party integrations (e.g., Zapier). Task Automation:  Automate task assignments, reminders, and notifications to keep teams aligned and projects on track. Data Synchronisation:  Ensure real-time data updates across integrated systems for consistent and accurate information. 6. Analytics and Reporting MyT Automation provides advanced analytics to drive data-informed decisions and optimise performance. Custom Dashboards:  Build tailored dashboards to monitor key performance indicators (KPIs) like sales, conversions, and user engagement. Real-Time Reporting:  Access up-to-date insights on marketing, sales, and operational metrics. Predictive Analytics:  Leverage AI-driven insights to forecast trends, customer behaviour, and revenue potential. Funnel Analysis: Identify drop-off points in sales funnels to improve conversion rates. 7. E-commerce and Payment Processing MyT Automation supports businesses in creating and managing online stores with integrated payment solutions. Product Management:  Organise products, manage inventory, and set pricing from a single platform. Payment Gateways:  Integrate with popular payment processors like Stripe, PayPal, and Square for secure transactions. Subscription Billing:  Offer recurring revenue models with automated billing and subscription management. Order Tracking:  Monitor orders and provide customers with real-time updates on their purchases. 8. Security and Compliance The platform prioritises data security and regulatory compliance to protect businesses and their clients. Data Encryption:  Use AES 256-bit encryption for secure file storage and data transfer. Role-Based Access Controls:  Assign granular permissions to ensure data access is restricted to authorised users. Compliance Tools:  Support GDPR, CCPA, and other regulations with data anonymisation and privacy controls. Audit Trails:  Track changes and user actions for transparency and compliance. 9. Scalability and Integrations MyT Automation is designed to scale with your business and integrate seamlessly with existing systems. API Access: Connect with third-party tools and custom applications via robust APIs. Multi-Platform Support:  Deploy on web, mobile, or hybrid environments with flexible hosting options (cloud or on-premises). Extensibility:  Add plugins or extensions to enhance functionality based on specific business needs. Real-Time Data Sync:  Integrate with CRMs, marketing tools, and analytics platforms for a unified workflow. Use Cases  MyT Automation is versatile and caters to a wide range of industries and business types: Digital Agencies:  Deliver marketing, CRM, and automation services to clients with a professional platform. Entrepreneurs and Resellers:  Launch a micro-SaaS business targeting niche markets with a robust solution. E-commerce Businesses:  Build and manage online stores with integrated marketing and payment solutions. Consultants and Freelancers:  Streamline client management, project tracking, and reporting with a professional platform. Startups:  Scale operations quickly with a cost-effective, ready-to-use solution that supports growth. Benefits Speed to Market:  Launch services in days, not months, with pre-built tools and templates. Cost Efficiency:  Avoid the high costs of custom software development and maintenance. Streamlined Operations:  Consolidate marketing, sales, and customer management into a single platform. Recurring Revenue:  Offer subscription-based services to generate predictable income. Scalability:  Grow your business with a platform that adapts to increasing client demands and integrates with existing systems. Why Choose MyT Automation? MyT Automation is a powerful, all-in-one solution that combines marketing automation, CRM, website building, e-commerce, and conversational AI into a single platform. Its no-code interface, extensive customisation options, and robust integrations make it ideal for businesses looking to deliver high-value services.  With advanced analytics, security features, and scalability, MyT Automation empowers users to focus on growth, client satisfaction, and revenue generation while the platform handles the technical complexities.

1...678

Courses matching "Security"

Show all 4658

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)

5.0(3)

By Ember Compliance

This is a gateway course for all further learning in FD&FA systems.

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)
Delivered Online + more
£230

Legal Aid - Family Controlled Work Billing Course

By DG Legal

The LAA operates a strict compliance regime when it comes to auditing family controlled work matters, and mistakes can often result in a Contract Notice, corrective action, and further follow-up activity within 6 months. This course will discuss the various aspects of family controlled work billing, with discussions on topics such as how to bill private law, public law, and help with mediation matters; how to evidence whether substantive negotiations and a settlement have taken place in private law matters; how do the LAA audit travel and other disbursement claims; what evidence must be present on files to avoid any issues on audit – including scope, gateway evidence, and forms/evidence of means (rules on evidence of means will be included in brief, however, a separate, more in-depth Civil Means Assessment Guidance Course is available); and the rules on claiming separate matters and escape fees. Key aspects of the Civil Contract and associated LAA Guidance (including the Codes Guidance) will be included, along with a discussion of common errors that are made. Target Audience This online course is aimed at anyone involved in billing Family Controlled Work matters or managing an LAA Family Contract. Resources Course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Steve Keeling, Consultant, DG Legal Steve joined DG Legal after leaving the Legal Aid Agency in August 2016. In his 17 years at the LAA, he worked in the audit team as both auditor and manager and was a Contract Manager for several years. Steve is also a certified SQM auditor and undertakes audits on behalf of Recognising Excellence as well as running training sessions for the SQM Audit Team periodically.

Legal Aid - Family Controlled Work Billing Course
Delivered Online + more
£67.50 to £90

Maryland Security Officer Initial & Renewal Course

5.0(1)

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day for the day course or 3 days, 4 hours per day for the night course. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission. Once you purchase this course, it may not be canceled. You can request another later scheduled date if a conflict arises.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

C01EX - BS 5839-1 RQF Award Examination (online)

5.0(4)

By Ember Compliance

The RQF examination allows learners to demonstrate knowledge of BS 5839-1: 2017 as part of competence in the design, installation, commissioning, and maintenance of FD&FA systems.

C01EX - BS 5839-1 RQF Award Examination (online)
Delivered Online + more
£249

Preliminary Electronic Security Course

By Hi-Tech Training

The Preliminary Electronic Security Course is an introductory (or revision) course designed to provide participants who have no previous Electrical or Electronics experience with the background skills required to attend the CCTV Installation Course, Access Control Course or Fire Alarm Foundation Course. The course gives both an introduction to electronics and electronic security and shows how the two fields merge together. Ideal for a beginner wishing to learn more about this fascinating area. A large practical content is guaranteed. The day will be an excellent learning experience with a skilled instructor. It is a great introduction to the other courses we provide.

Preliminary Electronic Security Course
Delivered Online
£85 to £685

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697