• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4607 Security courses in Westergate delivered Online

Cloud Computing / CompTIA Cloud+ (CV0-002)

4.9(27)

By Apex Learning

Overview Cloud computing has become the backbone of businesses and organisations across the globe. Our 'Cloud Computing / CompTIA Cloud+ (CV0-002)' course will equip you with the knowledge and skills needed to excel in this burgeoning industry. The demand for cloud computing professionals is soaring, with an estimated 61% of companies already using cloud-based applications. This dynamic field offers lucrative opportunities and a wide salary range, making it a wise career choice.  Cloud computing professionals are in high demand worldwide, and this course empowers you to join their ranks. With a focus on CompTIA Cloud+ (CV0-002), you'll gain a comprehensive understanding of cloud technologies, deployment models, security protocols, and much more.  This course is your ticket to your career in cloud computing. Enrol today! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cloud Computing / CompTIA Cloud+ (CV0-002). It is available to all students, of all academic backgrounds. Requirements Our Cloud Computing / CompTIA Cloud+ (CV0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 100 lectures • 10:39:00 total length •Introduction to the Cloud: 00:04:00 •Cloud+ Exam Info: 00:08:00 •What Can Cloud+ Do For You?: 00:03:00 •Preparing for the Cloud+ Exam: 00:06:00 •Setting up Your Cloud Accounts: 00:06:00 •Defining the Cloud: 00:08:00 •Deployment Models: 00:05:00 •Public Cloud (Demo): 00:08:00 •Private Cloud (Demo): 00:06:00 •Community Cloud (Demo): 00:06:00 •Hybrid Cloud (Demo): 00:05:00 •Additional Models: 00:05:00 •Cloud Architectures: 00:06:00 •Capacity, Elasticity, and Support Agreements: 00:08:00 •Resource Balancing: 00:07:00 •Change Management: 00:07:00 •Deployment Exam Objectives Explained: 00:06:00 •Cloud Component Interactions, Part 1: 00:07:00 •Cloud Component Interaction, Part 2: 00:08:00 •Non-Cloud Component Interactions: 00:09:00 •Platforms and Applications: 00:05:00 •Baselines (Lab): 00:07:00 •Target Hosts: 00:05:00 •Existing Systems (Lab): 00:09:00 •Architecting for Elements and Targets (Demo): 00:07:00 •Selecting Deployment Tools (Demo): 00:07:00 •Executing a Deployment Plan (Demo): 00:09:00 •Evaluating Testing Plans: 00:05:00 •Testing Techniques: 00:05:00 •Analyzing Testing Results: 00:04:00 •Baseline Confirmation (Lab): 00:08:00 •Deployment Problem Resolution (Lab): 00:08:00 •Cloud Storage Types: 00:06:00 •Provisioning Storage: 00:06:00 •Storage Protection Capabilities: 00:09:00 •Storage Features: 00:06:00 •Access Protocols: 00:06:00 •Storage Management (Demo): 00:06:00 •Storage Security (Lab): 00:05:00 •Disaster Recovery Capabilities (Demo): 00:07:00 •Disaster Recovery Considerations: 00:05:00 •Business Continuity Plan (Lab): 00:07:00 •Compute Introduction: 00:06:00 •CPU Capabilities: 00:08:00 •Memory Requirements: 00:07:00 •Performance Considerations: 00:07:00 •Cost Considerations (Lab): 00:07:00 •Energy Savings: 00:05:00 •Dedicated vs. Shared Compute: 00:04:00 •High Availability and Disaster Recovery for Compute: 00:05:00 •Monitoring (Lab): 00:08:00 •Forecasting: 00:05:00 •Policies: 00:03:00 •Network Components (Demo): 00:09:00 •Network Protocols: 00:04:00 •Network Ports (Lab): 00:05:00 •Virtual Private Networks (VPNs): 00:08:00 •IDS/IPS: 00:07:00 •Segmentation: 00:09:00 •Network SLAs and Change Management: 00:04:00 •Networking in Different Models: 00:05:00 •Security Policies: 00:06:00 •Standards and Compliance (Demo): 00:05:00 •Identity, Authentication, and Authorization: 00:08:00 •Multi-Factor Authentication (Lab): 00:05:00 •Authorization (Lab): 00:08:00 •Encryption (Demo): 00:08:00 •Compute Security (Demo): 00:07:00 •Account Management (Lab): 00:07:00 •Segmentation (Lab): 00:05:00 •Security Tools (Demo): 00:07:00 •Security Services: 00:05:00 •Security Automation and Orchestration: 00:06:00 •Models and Security: 00:06:00 •Migration Types: 00:07:00 •Workload Management: 00:05:00 •Virtualizing Physical Systems: 00:06:00 •Migrating Security: 00:07:00 •Protocols and Services: 00:08:00 •Environmental Constraints: 00:07:00 •Planning Patch Management: 00:07:00 •Manual Patch Management: 00:04:00 •Automated Patch Management (Lab): 00:03:00 •Update Types: 00:08:00 •Automated Workflows (Lab): 00:07:00 •Backup Types (Lab): 00:10:00 •Backup Targets and Options: 00:07:00 •Maintenance Automation Techniques: 00:05:00 •Maintenance Automation Tasks: 00:07:00 •Provisioning and Deprovisioning: 00:07:00 •Application Life Cycle: 00:03:00 •Monitoring and Reporting (Lab): 00:07:00 •Monitoring Metrics: 00:06:00 •Troubleshooting Methodology: 00:08:00 •Troubleshooting Deployment: 00:07:00 •Troubleshooting Capacity: 00:08:00 •Troubleshooting Automation and Orchestration: 00:07:00 •Troubleshooting Connectivity: 00:10:00 •Troubleshooting Security: 00:09:00 •Resource - Cloud Computing / CompTIA Cloud+ (CV0-002): 00:00:00

Cloud Computing / CompTIA Cloud+ (CV0-002)
Delivered Online On Demand10 hours 39 minutes
£12

Event Crowd Control Course

5.0(2)

By Training Express

Whether it’s a packed music festival or a lively sports match, managing large crowds isn’t just about waving a high-vis vest – it’s about timing, awareness, and knowing what to do when thousands of people move at once. This Event Crowd Control Course gives you a strong grasp of how to plan, manage, and respond to crowd-related scenarios, all from the comfort of your screen. You’ll explore key concepts in crowd psychology, event planning strategies, and safety measures that help reduce risk and keep things flowing. If you’ve ever wondered how major venues operate smoothly behind the scenes – this is your inside look. You won’t need boots on the ground or a clipboard in hand – just a smart device and a sharp mind. This course is designed for those working in event security, stewarding, or anyone involved in managing gatherings big or small. With clear content, sharp insights, and the occasional moment of dry humour (yes, we said it), you’ll learn how to stay one step ahead when managing people en masse. The goal? Keeping events safe, steady, and just the right kind of unforgettable. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 01: Introduction to Crowd Management Module 02: Crowd Control Techniques Module 03: Crowd Management Planning and Operations Module 04: Crowd Management Equipment Module 05: Emergency Situations in Crowd Management Module 06: Ethical Considerations in Crowd Management Learning Outcomes: Analyse crowd behaviour and dynamics effectively. Implement crowd control strategies with precision. Develop comprehensive crowd management plans. Identify and operate essential crowd management equipment. Respond to emergency situations with confidence. Uphold ethical standards in crowd management practices. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Event security professionals Law enforcement officers Venue managers Event planners Security consultants Public safety personnel Students interested in security careers Anyone seeking expertise in crowd management Career path Event Security Officer Safety and Security Coordinator Crowd Control Manager Public Safety Officer Security Consultant Event Venue Manager Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Event Crowd Control Course
Delivered Online On Demand1 hour
£12

Supervising Your Team Course

By DG Legal

Managing people and teams is consistently the biggest challenge raised by new managers (and even many experienced managers). This 3 hour course is aimed at introducing new and existing supervisors and managers to key supervisory skills, allowing them to develop their competence as supervisors. The course covers: Understanding your role as a supervisor SRA obligations and competence expectations Setting expectations and effective delegation Monitoring progress and quality Managing performance in difficult situations Top tips for impactful feedback By the end of this course participants will have had an opportunity to consider their current skills; develop new skills; and think about further development needs. Target Audience This online course is aimed at managers, team leaders and other supervisors. Please note that this course does NOT meet the LAA requirements as a Supervisor Course. If you need a Legal Aid Supervisor course, then please check out our Supervision & Managing Performance Course. Resources Course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Matthew Howgate, Consultant, DG Legal Matt is a non-practising solicitor who has considerable experience in regulatory issues and advising on complex issues of compliance and ethics. He is also an expert in data protection, UK GDPR and on the civil legal aid scheme. Matthew is a lead trainer on and co-developed the LAPG Certificate in Practice Management (a training programme for legal managers and law firm owners) as well as regularly providing training on legal aid Supervision, costs maximisation, data protection and security and on general SRA compliance.

Supervising Your Team Course
Delivered Online
£135 to £180

GDPR Training UK

4.3(43)

By John Academy

Overview Every day, millions and billions of important data are uploaded and updated. This massive surge of data requires skilled professionals who can ensure its safety and security. This is where our GDPR Training UK comes in. Our premium course is designed to educate current and future data professionals on data protection and help them ensure the utmost protection. The course will help you understand the core principles and significance of GDPR. From the comprehensive modules, you will learn about the legal foundation and governance of GDPR. In addition, you will grasp the techniques for protecting data and international transactions. You will also get an in-depth understanding of national security.  After the completion of the course, you will receive a certificate of achievement. This certificate will demonstrate your expertise in this area and help you seek your dream career. Enrol now! Course Preview Learning Outcomes Understand the principles of the UK GDPR Familiarise yourself with the legal foundation of GDPR Deepen yourself with the governance of GDPR Know the process of protecting personal data Gain in-depth knowledge of international transactions and national security Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Engaging tutorial videos, materials from the industry-leading experts Opportunity to study in a user-friendly, advanced online learning platform Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. What Skills Will You Learn from This Course? GDPR Knowledge Data Protection Who Should Take this GDPR Training UK? Whether you're an existing practitioner or an aspiring professional, this course is an ideal opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This GDPR Training UK course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ This exclusive GDPR Training UK course will equip you with effective skills and abilities and help you explore career paths such as  Data Privacy Officer Cybersecurity Analyst Data Security Analyst IT Officer Module 01:Exemptions to GDPR Exemptions to GDPR 00:12:00 Module 02:International Transactions and National Security International Transactions and National Security 00:14:00 Module 03:Protecting Personal Data Protecting Personal Data 00:13:00 Module 04:The Governance of GDPR The Governance of GDPR 00:12:00 Module 05:The Legal Foundations of GDPR The Legal Foundations of GDPR 00:12:00 Module 06:The Purpose and Principles of the UK GDPR The Purpose and Principles of the UK GDPR 00:11:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

GDPR Training UK
Delivered Online On Demand1 hour 14 minutes
£23.99

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Certified Network Associate

5.0(1)

By Course Gate

This Cisco Certified Network Associate course is the exam associated with the Cisco Certified Entry Network Technician certification and a tangible first step, second being ICND2, in achieving the Cisco Certified Network Associate certification. This Cisco Certified Network Associate course will prepare you for this exam. This exam stands to test your knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. The exam includes topics on networking fundamentals; connecting to a WAN; basic security and wireless concepts; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOS devices; configuring RIPv2, static and default routing; implementing NAT and DHCP; and configuring simple networks. This course provides the foundational understanding of network Layers 1-3 that are applicable to core routing and switching plus other advanced technologies. All configuration commands are introduced through examples and supported with lab exercises. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then Cisco Certified Network Associate course is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career Path Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. Course Curriculum Building a Simple Network Networking Functions 00:20:00 Understanding the Host-to-Host Communications Model 00:23:00 Introducing LANs 00:17:00 Introduction to the IOS 00:32:00 Starting a Switch 00:11:00 Understanding Ethernet and Switch Operation 00:27:00 Troubleshooting Common Switch Media Issues 00:16:00 Perform Switch Startup 00:29:00 Troubleshooting Switch Media Issues 00:09:00 Command Line Help 00:07:00 Establishing Internet Connectivity Understanding the TCPIP Internet Layer 00:31:00 Understanding IP Addressing and Subnets 00:41:00 Understanding the TCPIP Transport Layer 00:24:00 Exploring the Functions of Routing 00:22:00 Configuring a Cisco Router 00:19:00 Exploring the Packet Delivery Process 00:24:00 Enabling Static Routing 00:18:00 Managing Traffic Using ACLs 00:18:00 Enabling Internet Connectivity 00:50:00 Performing Initial Router Setup Media Issues 00:15:00 Connecting to the Internet 00:24:00 Life of a Packet 00:11:00 Managing Network Device Security Securing Administrative Access 00:33:00 Implementing Device Hardening 00:47:00 Implementing Traffic Filtering with ACLs 00:32:00 Ethernet the Security of the Intial Configuration Part 1 00:16:00 Ethernet the Security of the Intial Configuration Part 2 00:22:00 Device Hardening 00:31:00 Filtering Traffic with ACLs 00:12:00 Configuring SSH 00:10:00 Configuring NTP 00:06:00 AAA 00:14:00 DHCP Snooping 00:08:00 Building a Medium-Sized Network Implementing VLANs and Trunks 00:31:00 Routing Between VLANs 00:12:00 Using a Cisco Network Device as a DHCP Server 00:16:00 Introducing WAN Technologies 00:15:00 Introducing Dynamic Routing Protocols 00:32:00 Implementing OSPF 00:40:00 Configuring Expanded Switch Networks 00:24:00 Configuring DHCP Server 00:13:00 Implementing OSPF 00:40:00 Troubleshooting OSPF 00:04:00 Implementing RIPv2 00:12:00 Introducing IPv6 Introducing Basic IPv6 00:23:00 Understanding IPv6 00:11:00 Configuring IPv6 Routing 00:11:00 IPv6 Addresses 00:17:00 Configure and Verify IPv6 Routing 00:20:00 IPv6 ACL 00:11:00 IPv6 RIP 00:16:00 Mock Exam Mock Exam - Cisco Certified Network Associate (CCNA) 00:20:00 Final Exam Final Exam - Cisco Certified Network Associate (CCNA) 00:20:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Cisco Certified Network Associate
Delivered Online On Demand18 hours 27 minutes
£11.99

AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training

By Packt

This comprehensive course on AWS Certified Cloud Practitioner (CLF-C01) empowers you to fast-track your IT career. Gain in-depth knowledge of cloud computing, AWS services, and architectural concepts. With hands-on labs, quizzes, and real practice exams, you will confidently build cost-effective, fault-tolerant IT solutions on the AWS Cloud.

AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training
Delivered Online On Demand16 hours 31 minutes
£48.99

CompTIA PenTest+ (Ethical Hacking)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Certified Penetration Testing Engineer (CPTE) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Penetration Testing Engineer (CPTE) - Complete Video Course covers everything you need to know about becoming a Certified Penetration Testing Engineer. In this course you will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers and will increase the ability to identify protection and reduce any risks that could be there for hackers to take advantage of. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Penetration Testing Engineer (CPTE) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Penetration Testing Engineer (CPTE) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Logistics of Pen Testing Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals Linux Fundamentals 00:22:00 Information Gathering Information Gathering 00:38:00 Detecting Live Systems Detecting Live Systems 00:34:00 Enumeration Enumeration 00:25:00 Vulnerability Assessments Vulnerability Assessments 00:20:00 Malware Goes Undercover Malware Goes Undercover 00:28:00 Windows Hacking Windows Hacking 00:39:00 Hacking UNIX/Linux Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS Networks, Sniffing and IDS 00:42:00 Injecting the Database Injecting the Database 00:26:00 Attacking Web Technologies Attacking Web Technologies 00:30:00 Project Documentation Project Documentation 00:17:00 Mock Exam Mock Exam- Certified Penetration Testing Engineer (CPTE) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Penetration Testing Engineer (CPTE) - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Penetration Testing Engineer (CPTE) - Complete Video Course
Delivered Online On Demand8 hours 4 minutes
£23

Bodyguard Training

3.0(2)

By Alpha Academy

Step into the world of personal protection with our Professional Bodyguard Training Course. This course offers essential skills for anyone who wants to work in close protection. You’ll explore everything from personal safety and risk assessment to physical intervention and escort tactics. You’ll also learn how to stay alert during emergencies and adapt to changing environments like the post-COVID world. Learning Outcomes Explain the key duties and roles of a professional bodyguard. Understand personal security basics and protective techniques. Apply UK laws and rules related to close protection. Identify and assess threats in various settings. Plan safe movements and protective operations. Who is this for? This course is ideal for anyone looking to start a career in bodyguard services or improve their current skills. It suits ex-forces, security workers, doormen, private drivers, or anyone interested in close protection. No matter your background, if you’re keen to work in personal security, this course is made for you. Career path After finishing this course, you can explore jobs such as Close Protection Officer, Security Escort, or Event Security Staff. Many learners also move into private security firms or start working with high-profile individuals. Prerequisites You don’t need previous experience to join this course. Anyone over 18 with a keen interest in bodyguard work or personal protection is welcome. A good level of spoken and written English will help you follow the course well. Certification Upon completion of the course and passing the final assessment, you can obtain a PDF certificate for £9.99. Hard copy certificates are available for an additional £15.99. Disclaimer: This is an online course with pre-recorded sessions. Course access will be granted within 24 hours of enrollment. (Learn more about this online course)

Bodyguard Training
Delivered Online On Demand8 hours
£9.99