• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4542 Security courses in Sittingbourne delivered Online

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
£2,975

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Tactical Crime Analysis Certificate

4.5(3)

By Studyhub UK

Overview Step into the world of criminal analysis with the Tactical Crime Analysis Certificate, a comprehensive journey through the multifaceted landscape of crime and its intricate mechanisms. This course unveils the complexities of the criminal justice system in England and Wales, offering insights into various classifications of crime and the depths of crime scenes. Learners will explore the innovative realms of crime mapping and delve into the psychological underpinnings of criminal behaviour. The curriculum extends beyond traditional boundaries, incorporating financial and environmental aspects of criminology, and sheds light on the art and science of criminal profiling. With modules dedicated to criminal intelligence analysis and the evolving role of technology, this programme is a gateway to understanding the dynamic interplay between policing and cyber security, capped off with a focus on predictive methodologies and research techniques. Learning Outcomes: Gain foundational knowledge of crime analysis and its importance in the criminal justice system. Understand the classification of crime and the processes involved in analyzing crime scenes. Develop skills in crime mapping to visualize and analyze crime data for tactical purposes. Learn tactical crime analysis techniques to identify patterns, trends, and modus operandi to aid in investigations. Understand strategic and administrative crime analysis to inform decision-making and resource allocation. Explore the fundamentals of criminal behavior and psychology to understand the motivations and dynamics behind criminal acts. Learn about financial and environmental criminology and their relevance in analyzing and preventing crime. Understand the role of criminal justice in addressing crime and maintaining public safety. Gain knowledge of criminal profiling, including its scientific basis and application in investigations. Develop skills in criminal intelligence analysis and utilize technology for gathering and analyzing intelligence data. Learn research methods and statistical analysis techniques applicable to crime analysis. Understand the intersection of policing and cyber security in combating crime in the digital age. Explore the concept of forecasting future occurrences and prediction in crime analysis. Why buy this Tactical Crime Analysis Certificate? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Tactical Crime Analysis Certificate there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aspiring to become crime analysts, seeking a foundational understanding of crime analysis techniques. Law enforcement officers aiming to enhance their analytical skills in crime scene investigation and profiling. Criminal justice students desiring a comprehensive view of crime analysis and its application in the field. Security professionals interested in expanding their knowledge of crime mapping and intelligence analysis. Policy makers and criminal justice administrators focused on strategic approaches to crime prevention and analysis. Prerequisites This Tactical Crime Analysis Certificate does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Tactical Crime Analysis Certificate was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Crime Analyst: £25,000 - £35,000 Per Annum Intelligence Officer: £30,000 - £45,000 Per Annum Forensic Psychologist: £31,000 - £48,000 Per Annum Cyber Security Analyst: £35,000 - £55,000 Per Annum Criminal Profiler: £27,000 - £40,000 Per Annum Police Detective: £29,000 - £43,000 Per Annum Course Curriculum Module 01: Introduction to Crime Analysis Introduction to Crime Analysis 00:31:00 Module 02: The Criminal Justice System in England and Wales The Criminal Justice System in England and Wales 00:18:00 Module 03: Classification of Crime Classification of Crime 00:37:00 Module 04: Crime Scene Crime Scene 00:26:00 Module 05: Crime Mapping Crime Mapping 00:28:00 Module 06: Tactical Crime Analysis Tactical Crime Analysis 00:44:00 Module 07: Strategic and Administrative Crime Analysis Strategic and Administrative Crime Analysis 00:32:00 Module 08: Criminal Behaviour and Psychology Criminal Behaviour and Psychology 00:40:00 Module 09: Financial and Environmental Criminology Financial and Environmental Criminology 00:42:00 Module 10: Criminal Justice Criminal Justice 00:36:00 Module 11: Criminal Profiling: Science, Logic and Metacognition Criminal Profiling: Science, Logic and Metacognition 00:25:00 Module 12: Phases of Profiling Phases of Profiling 00:30:00 Module 13: Criminal Intelligence Analysis Criminal Intelligence Analysis 00:21:00 Module 14: Technology in Criminal Intelligence Analysis Technology in Criminal Intelligence Analysis 00:20:00 Module 15: Research Method and Statistics in Crime Analysis Research Method and Statistics in Crime Analysis 00:28:00 Module 16: Policing and Cyber Security Policing and Cyber Security 00:45:00 Module 17: Forecasting Future Occurrences and Prediction Forecasting Future Occurrences and Prediction 00:35:00 Assignment Assignment - Tactical Crime Analysis Certificate 00:00:00

Tactical Crime Analysis Certificate
Delivered Online On Demand8 hours 58 minutes
£10.99

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered OnlineFlexible Dates
Price on Enquiry

Extremism Awareness Training Course

5.0(2)

By Training Express

In today’s interconnected world, understanding the roots and risks of extremism is more crucial than ever. Our Extremism Awareness Training Course is designed to offer learners a thoughtful exploration of the ideologies, behaviours, and warning signs linked to radicalisation. By providing valuable insights into the factors that influence extremist thinking, this course aims to promote safer communities through informed vigilance. Delivered entirely online for maximum convenience, the course addresses key concepts with clarity and purpose. Whether you are enhancing your knowledge for personal growth or professional development, this training is an excellent way to stay informed and prepared. Straightforward, engaging, and accessible – it’s learning that genuinely makes a difference. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to Extremism and Terrorism Module 2: Factors Influencing Extremist Views Module 3: Radicalisation and Recruitment Processes Module 4: Recognising Signs of Radicalisation Module 5: Responding to Terrorism Incidents Module 6: Counter-Terrorism Measures in the UK Learning Outcomes: Analyse factors shaping extremist ideologies. Recognise indicators of potential radicalisation. Implement appropriate responses to terrorism incidents. Understand the UK's counter-terrorism measures. Evaluate the impact of radicalisation on communities. Foster a comprehensive awareness of terrorism prevention strategies. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Law enforcement professionals Security personnel Educators and school administrators Social workers and community leaders Government officials Journalists and media professionals Human resources personnel Concerned citizens and community members Career path Intelligence Analyst Counter-Terrorism Researcher Community Outreach Coordinator Policy Analyst (Security and Counter-Terrorism) Crisis Management Specialist Security Consultant Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Extremism Awareness Training Course
Delivered Online On Demand1 hour
£12

Digital Forensics for Pentesting Course

4.3(43)

By John Academy

Course Overview Won't it be great if you could recover your lost data from your device or ensure that the hackers cannot reach you? What about tracking the hacker and get back the data they have stolen from you? Digital security has become one of the greatest concerns today. Learn how you can secure your device and find out black hat hacker criminals from this Digital Forensics for Pentesting Course and ensure data security. In this Digital Forensics for Pentesting Course, you will learn the importance of digital forensic investigation, the basics of cybersecurity, pentesting and digital forensic. You'll understand the functions of Malware and how to track them back. This course is ideal for understanding how digital devices can be hacked and how to prevent them. You will be able to understand digital forensic investigation steps with easily understandable and bite-sized lessons. Learning Outcomes Get a clear understanding of what digital forensic investigation is Be able to produce professional and legal digital forensic reports Learn to utilise various forensic tools for digital forensic investigation Properly handle digital media during the investigation Recover deleted data from various devices and operating systems Be able to track hackers malicious movement Who is this course for? This course will be helpful for anyone who wants to learn about pentesting and interested in digital forensic investigation. You will learn how to understand digital forensic investigation step by step from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Digital Forensics for Pentesting Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Digital Forensic Investigators Pentesters Data Security Officers White Hat Hackers Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Lab - Installing CSI Linux 00:13:00 Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Lab - Create a Virtual Install Kali Image Using VirtualBox 00:07:00 Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Install Additional Tool Using Katoolin3 00:10:00 Using Kali Forensic Mode and Autopsy Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Lab -Digital Forensics Using Autopsy Part I 00:11:00 Lab - Digital Forensics Using Autopsy Part II 00:07:00 Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source intelligence (OSINT) Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Lab - Find Social Media Accounts Using Sherlock 00:07:00 Computer Forensics Attaching an External USB Device in Kali 00:07:00 Lab - Memory Forensics Using the Volatility Framework 00:18:00 Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Lab - Analyzing the Windows Registry for Evidence 00:14:00 Using Shodan to Search for Vulnerable devices Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Stenography Lab - Using the EXIFtool to Read and Write EXIF Tags 00:11:00 Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network forensics Using Wireshark Overview of Wireshark 3.2 00:11:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:04:00 Lab - Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Lab - Installing a Wireless Adapter in Kali 00:09:00 Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Have learned Lab - CTF Lab Build for HA: Forensics 00:11:00 Lab - Capture flag #1 00:12:00 Lab - Capture flag #2 00:10:00 Lab - Capture flag #3 00:20:00 Lab - Capture flag #4 00:09:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Digital Forensics for Pentesting Course
Delivered Online On Demand5 hours 39 minutes
£18

Close Protection Certificate

4.5(3)

By Studyhub UK

Introducing the Close Protection Certificate, a comprehensive program tailored to equip you with the skills and knowledge required for close protection work in the UK. In an ever-evolving world, security is paramount, and our course is your gateway to a fulfilling career in close protection services. Begin your journey with an in-depth exploration of Close Protection fundamentals, followed by insights into the dynamics of a Protection Team. You'll meticulously guide through the planning process and focus on Threat Assessment, a critical aspect of the field. The course continues with honing your skills in Vehicle Drills and offers insights into Route Selection and Reconnaissance. Finally, ensure you are well-versed in the legislation that governs Close Protection in the UK. Learning Outcomes: Develop a solid foundation in Close Protection principles and practices. Gain expertise in threat assessment and security planning. Master the intricacies of vehicle drills and route selection. Understand the legal framework surrounding Close Protection in the UK. Be prepared for close protection work with top-notch training. Why buy this Close Protection Certificate? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Close Protection Certificate there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Close Protection Certificate for? Aspiring close protection professionals. Security personnel seeking specialization. Individuals interested in a challenging security career. Those aiming to enhance their skill set in the field. Anyone looking to enter this industry. Prerequisites This Close Protection Certificate does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Close Protection Certificate was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Close Protection Officer: £25,000 - £60,000 per annum Security Consultant: £30,000 - £70,000 per annum Private Security Contractor: £35,000 - £80,000 per annum Security Team Leader: £40,000 - £90,000 per annum Security Manager: £45,000 - £100,000 per annum Security Director: £50,000 - £120,000 per annum Course Curriculum Module 01: Introduction to Close Protection Introduction to Close Protection 00:15:00 Module 02: The Close Protection Team The Close Protection Team 00:22:00 Module 04: Threat Assessment The Planning 00:30:00 Module 03: The Planning Threat Assessment 00:24:00 Module 05: Vehicle Drills: Embus and Debus Vehicle Drills: Embus and Debus 00:36:00 Module 06: Route Selection and Reconnaissance Route Selection and Reconnaissance 00:16:00 Module 07: Legislation Regarding Close Protection Legislation Regarding Close Protection 00:19:00 Assignment Assignment - Close Protection Certificate 00:00:00

Close Protection Certificate
Delivered Online On Demand2 hours 42 minutes
£10.99

Door Supervising

4.7(160)

By Janets

Register on the Door Supervising today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Door Supervising is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Door Supervising Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Door Supervising, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Working Within the Private Security Industry Working Within the Private Security Industry 00:12:00 Module 02: Door Supervising: An Introduction Door Supervising An Introduction 00:20:00 Module 03: Door Supervising Key Skills Door Supervising Key Skills 00:24:00 Module 04: Conflict Management for The Private Security Industry Conflict Management for The Private Security Industry 00:29:00 Module 05: Physical Intervention Skills Physical Intervention Skills 00:16:00 Module 06: Health and Safety for the Private Security Professionals Module 19: C# Primary Operators 00:03:00 Module 07: Basic First Aid Techniques Module 22: C# Equality Operators - Demo 00:02:00 Assignment Assignment - Door Supervising 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Door Supervising
Delivered Online On Demand1 hour 46 minutes
£25

Data Documentation and Record Keeping Course

5.0(2)

By Training Express

Messy records? Missing files? Welcome to the side of admin where everything finally makes sense. This Data Documentation and Record Keeping Course is your guide to getting things sorted—properly. You’ll learn the art of tidy records, digital documentation, smart filing systems, and how to avoid the chaos that often comes with paper trails and forgotten file names. From managing sensitive data to keeping consistent logs, the course takes you through exactly what’s needed to stay organised, stay secure, and stay one step ahead. Whether you’re in healthcare, finance, education, or any sector that still loves a good spreadsheet (and let’s be honest, that’s most of them), good record keeping isn't just useful—it’s essential. This course helps you avoid those costly errors, keep your audits painless, and make sure that everything is easy to find when needed. No fluff, just the solid know-how to keep your records neat, clear and reliable. Because when the paperwork’s right, everything else runs smoother. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to Data Documentation and Record Keeping Module 2: Data Collection and Organisation Module 3: Data Storage and Retrieval Module 4: Data Documentation Strategies Module 5: Record-Keeping and Compliance Module 6: Data Security and Access Control Learning Outcomes: Master data collection techniques for comprehensive information acquisition. Implement effective strategies for organised and retrievable data storage. Develop robust documentation practices to enhance data comprehension. Ensure compliance with industry standards through meticulous record-keeping. Establish advanced data security measures and access control protocols. Navigate the complexities of the evolving data landscape with confidence. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Data analysts and entry-level professionals. IT professionals seeking to enhance data management skills. Business professionals involved in data-driven decision-making. Compliance officers and regulatory affairs specialists. Information security enthusiasts. Professionals aiming to advance their career in data management. Individuals transitioning to roles requiring data expertise. Anyone keen on mastering the intricacies of data documentation and record keeping. Career path Data Analyst Compliance Officer Information Security Analyst Records Manager Database Administrator Regulatory Affairs Specialist Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Data Documentation and Record Keeping Course
Delivered Online On Demand1 hour
£12

Logistic Management, Merchandising & Retail Associate

4.7(47)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Logistic Management, Merchandising & Retail Associate Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Take the leap and invest in your professional growth with the Law 3 QLS Bundle, offering an in-depth exploration of Business Law, International Law and Cyber Security. This comprehensive package boasts three QLS-endorsed courses, certifying your theoretical mastery in these key areas. But the learning doesn't stop there! You'll also receive five CPD QS accredited courses, enhancing your knowledge with relevant international business principles, case studies, development studies, relations and advanced Cyber Security training. These courses are crafted for discerning learners, creating a world of opportunities for you to understand complex legalities, global affairs, and security challenges. Witness a transformation in your problem-solving and decision-making skills, as you explore these eight immersive courses. Best of all, hardcopy certificates are included with the QLS-endorsed courses, providing tangible evidence of your professional development. In a rapidly globalising world, command over Business Law, International Law and Cyber Security could set you apart from your peers. Equip yourself with the knowledge you need to navigate the intricate legal landscape and safeguard vital information in the digital age. Remember, knowledge is power. And the Law 3 QLS Bundle is your key to unlocking that power. Key Features of the Law 3 QLS Bundle (Business Law, International Law & Cyber Security) Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our Logistic Management, Merchandising & Retail Associate bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Logistic Management QLS Course 02: Merchandising QLS Course 03: Retail Associate Certificate 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Retail Management Course 02: Supply Chain Management Course 03: Certificate in Purchasing and Procurement Course 04: Transport Manager Course 05: Visual Merchandising Diploma In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our Logistic Management, Merchandising & Retail Associate courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes: Comprehend the intricacies of Business Law and its application in real-world situations. Gain a robust understanding of International Law, including Criminal Law, Commercial Law, and Environmental Law. Develop a strong theoretical knowledge base in Cyber Security Law. Understand the principles of International Business, along with case studies and development studies. Learn about International Relations and how it impacts global affairs. Master advanced concepts in Cyber Security, fortifying your knowledge of digital protection. Earn three QLS-endorsed certificates and five CPD QS accredited certificates upon completion. The Law 3 QLS Bundle is an all-encompassing educational package focused on Business Law, International Law, and Cyber Security. It delves deep into these topics, offering learners a complete theoretical understanding of each. It doesn't just provide knowledge, but also a unique perspective on how these laws affect our lives, businesses, and society. In addition, the bundle features five complementary courses that broaden your knowledge in International Business Principles, Business Case Studies, International Development Studies, International Relations, and Advanced Cyber Security Training. This mix of courses ensures that you are well-rounded in your understanding, and that you are equipped with valuable insights in these crucial fields. CPD 270 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals looking to deepen their understanding of Business Law, International Law, and Cyber Security. Professionals aiming to enhance their skills in global business principles and international relations. Aspiring legal and cyber security professionals seeking a theoretical base. Anyone interested in a comprehensive understanding of these complex and important areas. Career path Legal Consultant: Average Salary £45,000 - £80,000 International Law Advisor: Average Salary £55,000 - £90,000 Cyber Security Analyst: Average Salary £30,000 - £55,000 Compliance Officer: Average Salary £35,000 - £60,000 International Development Consultant: Average Salary £40,000 - £75,000 Business Analyst: Average Salary £40,000 - £70,000 Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

Logistic Management, Merchandising & Retail Associate
Delivered Online On Demand3 days
£309