• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4506 Security courses in Towcester delivered Online

Cyber Security

5.0(5)

By Wimbledon Training Services

Employees, managers and directors should all have a good understanding of the threat posed by cyber-attacks and the importance of guarding against data breaches. This short course will explain why cyber attacks and data breaches happen and provide practical advice on how to set up effective defences.

Cyber Security
Delivered Online On Demand
£42

Intermediate Ethical Hacking Hands-on Training

By Packt

This intermediate course provides hands-on training of white, grey, and black hat skills every cybersecurity professional needs to know.

Intermediate Ethical Hacking Hands-on Training
Delivered Online On Demand8 hours 27 minutes
£37.99

Cyber Risk Framework - Protect Assets

By Study Plex

This is a multi-part series to assist the participant in evaluating all the necessary components to conducting a cyber risk assessment. The purpose of a cyber risk assessment lies in the objectives of ensuring: Availability Confidentiality Integrity of data Integrity of processing We utilize the National Institute of Standards and Technology (NIST) cybersecurity framework to walk through various elements that should be considered with a cyber risk assessment. A previous segment delved into the first function outlined by NIST which is the “Identify” concept. This segment will delve into the “protect” function. We try to protect our information assets and systems against attack. Protection strategies can be the first line of defense, and breaches usually are a failure of protection strategies. Utilizing the concepts of categories and sub-categories an organization can effectively begin to map out their cyber risk process. The sub-categories of the protect function include: Awareness control Awareness and training Data security Information protection and procedures Maintenance Protective technologies This segment is dedicated to delving into each of these sub-categories and outlining possible considerations for protecting information and cyber assets. Learning Objectives Explore the objectives of a cyber risk management assessment. Explore security control designations. Explore the concept of baseline controls. Identify the requirements of ensuring awareness control within the protect function. Identify the requirements of ensuring awareness and training within the protect function. Identify the requirements of ensuring data security within the protect function. Identify the requirements of ensuring information protection and procedures within the protect function. Identify the requirements of ensuring maintenance within the protect function. Identify the requirements of ensuring protective technology within the protect function. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction and Objectives to Cyber Risk Assessment: Protect 00:04:00 Identify Critical Assets 00:07:00 Prioritize 00:07:00 Prioritize with Criticality 00:16:00 Prioritize Further Utilizing Impacts 00:10:00 Prioritize Further Utilizing Impacts Continued 00:10:00 Applying Likelihood to Impact 00:02:00 Integrating Priority with Impact/Likelihood 00:10:00 Summary 00:10:00 Supplementary Resources Supplementary Resources - Cyber Risk Framework - Protect Assets 00:00:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Risk Framework - Protect Assets
Delivered Online On Demand
£19.99

CompTIA Linux+ Certification - Complete Video Course

4.3(43)

By John Academy

Description Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. This CompTIA Linux+ Certification - Complete Video Course is designed to prepare you for the CompTIA Linux+ certification exam. It will provide you a comprehensive look at common tasks performed by system administrators. This includes installation, Management of Linux systems from the command line and the GUI, user administration, file permissions, customization, software configuration, Management of Linux-based clients, troubleshooting, and much more. Expanded coverage of networking and security are covered, which is in step with the CompTIA exam objectives. With this course, you'll acquire the fundamental skills and knowledge you need to successfully configure, manage and troubleshoot Linux systems. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Linux+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installation Linux Introduction FREE 00:25:00 Pre-installation Tasks 00:09:00 Linux Installation 00:18:00 Using Linux Graphical User Interfaces 00:26:00 Command Line Linux 00:56:00 File and Directory Management Directory Organization 00:33:00 File Management 00:58:00 Removable Storage 00:19:00 System Administration Users and Groups 00:57:00 File and Directory Permissions 00:53:00 User Environment Configuration 00:29:00 GUI Configuration 00:18:00 Application Management Packages and Package Managers 00:30:00 Source Code Software 00:20:00 System Configuration Disk Management 00:46:00 File System Management 00:29:00 Device Management 00:13:00 Process and Module Management Process Management 00:35:00 Process Priority and Execution 00:12:00 Kernel Modules 00:24:00 System Maintenance Backup and Restore 00:38:00 Scheduling Tasks 00:14:00 Performance Monitoring 00:26:00 Logging 00:39:00 Networking Networking Basics 00:58:00 Network Services 00:36:00 Domain Name Services 00:29:00 File Sharing and Printing Network File Resources 00:25:00 Printing 00:16:00 Interoperability Network Interoperability 00:18:00 Remote Desktop Access 00:08:00 Security System Security 00:23:00 Network Security 00:32:00 Web Environment Web Services 00:43:00 MySQL Services 00:13:00 FTP and Email Services FTP Services 00:36:00 Mail Services 00:05:00 Troubleshooting and Maintenance Booting Linux 00:28:00 Network Troubleshooting 00:11:00 Scripting Basics 00:08:00 Mock Exam Mock Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

CompTIA Linux+ Certification - Complete Video Course
Delivered Online On Demand19 hours 16 minutes
£23.99

Level 3 Diploma in Close Protection - QLS Endorsed

4.7(47)

By Academy for Health and Fitness

48-Hour Knowledge Knockdown! Prices Reduced Like Never Before! This Certificate in Close Protection at QLS Level 3 course is endorsed by The Quality Licence Scheme and accredited by CPDQS (with 120 CPD points) to make your skill development & career progression more accessible than ever! Our unique Close Protection at QLS Level 3 course might help you improve your current abilities or make a life-changing career move! It is an expertly designed course on Close Protection which ensures you learn everything about the topic thoroughly. Expand your expertise with high-quality training from the Close Protection at QLS Level 3 course. Due to Close Protection at QLS Level 3's massive demand in the competitive market, you can use our comprehensive course as a weapon to strengthen your knowledge. Learn from the Close Protection at QLS Level 3 course and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career. Close Protection involves the meticulous planning and execution of security measures to safeguard individuals or groups from potential threats. This comprehensive course is designed to equip participants with the knowledge and skills essential for a successful career in the field of Close Protection. The course encompasses a broad spectrum of topics, ranging from threat assessment to legislative intricacies surrounding Close Protection. This Close Protection at QLS Level 3 training can help you accomplish your ambitions and prepare you for a meaningful career. So, join us today and gear up for excellence! Learning Outcomes: Apply Close Protection strategies adeptly across diverse scenarios Showcase Close Protection team dynamics proficiency Hone meticulous planning skills for Close Protection security operations Conduct precise threat assessments in various Close Protection environments Master Close Protection vehicle drills, encompass Embus and Debus techniques Grasp legislation intricacies governing Close Protection operations Why Prefer This Course? Earn a Close Protection certificate endorsed by the Quality Licence Scheme and CPDQS-accredited certification for free. Receive a free Close Protection student ID card. Enjoy innovative, engaging Close Protection course content. Benefit from free Close Protection assessments. Access 24/7 Close Protection tutor support. Take a step toward a brighter future! *** Course Curriculum *** Module 01: Introduction Module 02: The Close Protection Team Module 03: The Planning Module 04: Threat Assessment Module 05: Vehicle Drills: Embus and Debus Module 06: Route Selection and Reconnaissance Module 07: Legislation Regarding Close Protection Assessment Process You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you have completed all of the Certificate in Close Protection at QLS Level 3 exams. CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Close Protection at QLS Level 3 This Close Protection at QLS Level 3 course is perfect for highly motivated people who want to improve their technical skills like: Security professionals Law enforcement Corporate personnel Requirements Close Protection at QLS Level 3 No prior background or expertise is required to enrol in this Close Protection Course. Career path The Close Protection at QLS Level 3 course will boost your CV and aims to help you get jobs such as: Close Protection Officer Security Consultant Executive Security Private Security Certificates Certificate in Close Protection at QLS Level 3 Hard copy certificate - Included After successfully completing the Certificate in Close Protection at QLS Level 3, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme andalso you can order CPDQSAccredited Certificate that is recognised all over the UK and also internationally. The certificates will be home-delivered, completely free of cost. CPDQS Accredited Certificate Digital certificate - Included

Level 3 Diploma in Close Protection - QLS Endorsed
Delivered Online On Demand7 days
£100

Learn Man in the Middle Attacks from Scratch

By Packt

If you are looking to expand your knowledge in Man in the Middle attacks, then this is the right course for you. Starting from setting up your Kali Linux lab environment and communication between devices to the basics of MITM attacks, this course covers it all. A course that focuses on both the practical and theoretical aspects.

Learn Man in the Middle Attacks from Scratch
Delivered Online On Demand2 hours 54 minutes
£14.99

CompTIA Network+ Certification (N10-008): The Total Course

By Packt

This is a complete and comprehensive CompTIA Network+ Certification (N10-008) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.

CompTIA Network+ Certification (N10-008): The Total Course
Delivered Online On Demand21 hours 41 minutes
£135.99

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

Vestacp: Install and Configure: Level-4

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Vestacp: Install and Configure: Level-4
Delivered Online On Demand1 hour 18 minutes
£25

HA240 SAP Authorization, Security, and Scenarios

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators, developers, developer consultants, system administrators, and technology consultants. Overview This training course will focus on the authorization, security, and integrated scenario. In this course, students will focus on the authorization, security, and integrated scenarios for SAP HANA. Module 1 Creation of authorizations and authorization roles Module 2 User management Module 3 Access control for HANA native models Module 4 Authorization trace Module 5 Auditing Module 6 Authentication and single sign-on options Module 7 Encryption options Module 8 Security considerations for Multitenant Database Containers Module 9 SAP GRC Integration for Governance Risk and Compliance Module 10 HANA use case scenarios and security requirements Module 11 SAP Netweaver Identity Management integration Module 12 Reusing of BW authorizations for SAP HANA applications Module 13 HANA Cloud Platform (HCP) security Module 14 HANA Enterprise Cloud security

HA240 SAP Authorization, Security, and Scenarios
Delivered OnlineFlexible Dates
Price on Enquiry