• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4519 Security courses delivered Online

The Complete Ethical Hacking Course

4.7(160)

By Janets

Register on the The Complete Ethical Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The The Complete Ethical Hacking Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The The Complete Ethical Hacking Course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the The Complete Ethical Hacking Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Introduction to Ethical Hacking What is an Ethical Hacker 00:07:00 Terminology Crash Course pt. 1 00:09:00 Terminology Crash Course pt. 2 00:14:00 Terminology Crash Course pt. 3 00:08:00 Legal Considerations 00:11:00 Reconnaissance - Surveying the Attack Surface Surveying the Attack Surface 00:10:00 Recon Types 00:08:00 Passive Recon Part 1 00:07:00 Passive Recon Part 2 00:10:00 Active Recon 00:15:00 Recon Walkthrough Tools Summary 00:14:00 Maltego Demo 00:07:00 FOCA Demo 00:05:00 DEMO - Harvester 00:02:00 Scanning and Enumeration - Getting Down to Business Scanning & enumeration 00:08:00 Identifying Active Hosts pt. 1 00:10:00 Identifying Active Hosts pt. 2 00:13:00 Identifying Active Services 00:18:00 OS and Services Fingerprinting 00:15:00 Network Mapping 00:10:00 Final Thoughts 00:05:00 DEMO - Nmap Syntax pt. 1 00:14:00 DEMO - Nmap Syntax pt. 2 00:16:00 DEMO - Nmap Hosts Discovery 00:12:00 DEMO - Nmap Service Discovery 00:17:00 DEMO - Nmap Scripts 00:11:00 DEMO - Masscan 00:11:00 Network Presence Network Insecurity 00:04:00 Sniffing and Spoofing 00:13:00 Sniffing Tools 00:09:00 Spoofing, Crypto and Wifi 00:15:00 DEMO - tcpdump 00:11:00 DEMO - Wireshark 00:11:00 DEMO - Ettercap 00:13:00 DEMO - Burp Suite 00:15:00 DEMO - Scapy 00:10:00 Attacking Security Overview pt. 1: Windows Architecture 00:18:00 Security Overview pt. 2: Credentials Security 00:16:00 Security Overview pt. 3: Memory Corruption and Exploitation 00:16:00 Windows Hacking Basics 00:20:00 Local Access and Privilege Escalation 00:20:00 Dumping Hashes and Cracking Passwords 00:18:00 Linux Attacking Basics pt. 1 00:13:00 Linux Attacking Basics pt. 2 00:14:00 References 00:08:00 DEMO - Windows MSF Exploit pt. 1 00:13:00 DEMO - Windows MSF Exploit pt. 2 00:15:00 DEMO - Post Exploitation Activities 00:13:00 DEMO - Mimikatz 00:07:00 DEMO - Hashcat 00:08:00 DEMO - Konboot 00:13:00 DEMO - Post Exploitation Windows CMD 00:14:00 DEMO - Post Exploitation Windows Powershell 00:13:00 DEMO - Attacking Linux targets pt. 1aa 00:10:00 DEMO - Attacking Linux targets pt. 1 00:13:00 Web Hacking Introduction to Web Hacking 00:03:00 Web Security Architecture Overview pt. 1 00:17:00 Web Security Architecture Overview pt. 2 00:12:00 Attacking the Web Server pt. 1 00:10:00 Attacking the Web Server pt. 2 00:11:00 Attacking the Platform pt. 1 00:19:00 Attacking the Platform pt. 2 00:08:00 Attacking the Technology pt. 1 00:21:00 Attacking the Technology pt. 2 00:17:00 OWASP Top 10 pt. 1 00:09:00 OWASP Top 10 pt. 2 00:21:00 Attacking the Business Logic pt. 1 00:11:00 Attacking the Business Logic pt. 2 00:15:00 Tools and Methodology 00:20:00 References 00:05:00 DEMO - OWASP Mutillidae 00:09:00 SQLI 00:07:00 SQL Map Intro 00:08:00 SQL Map 00:25:00 DEMO - Burpsuite 00:37:00 DEMO - Burpsuite XSS Hunter 00:16:00 DEMO - mitmproxy 00:10:00 DEMO - Skipfish pt.1 00:05:00 DEMO - Skipfish pt.2 00:05:00 Social Engineering - Hacking Humans Social Engineering Basics 00:15:00 Social Engineering Methods 00:16:00 Tools and Techniques pt. 1 00:15:00 Tools and Techniques pt. 2 00:12:00 Tools and Techniques pt. 3 00:09:00 Physical Security Considerations 00:13:00 Final Thoughts99 00:11:00 DEMO - Credential harvesting 00:02:00 DEMO - Website cloning 00:06:00 DEMO - Automating an attack 00:03:00 DEMO - Anti-virus evasion pt. 1 00:08:00 DEMO - Anti-virus evasion pt. 2 00:12:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

The Complete Ethical Hacking Course
Delivered Online On Demand18 hours 13 minutes
£25

CompTIA A+ (220-1002) - CPD Certified

4.7(26)

By Academy for Health and Fitness

48-Hour Knowledge Knockdown! Prices Reduced Like Never Before! Welcome to the ultimate CompTIA A+ (220-1002) bundle! If you're looking to get ahead in the tech industry, this bundle is the perfect place to start. With 11 comprehensive courses, you'll gain the knowledge and skills you need to succeed. Did you know that the CompTIA A+ (220-1002) course is QLS-endorsed? That means when you complete it, you'll receive a QLS hardcopy certificate for free! This certificate is a valuable asset in the tech industry, demonstrating your expertise and commitment to professional development. But that's not all - this bundle also includes 10 other courses that are CPD-QS accredited. From cybersecurity to cloud computing, you'll gain a comprehensive understanding of the most important topics in the industry today. And with our theoretical approach, you'll gain a deep understanding of the concepts that drive technology - no hands-on experience required. At our core, we believe that knowledge is power. That's why we've created this bundle - to help you unlock your full potential and achieve your career goals. Whether you're just starting out or looking to take your skills to the next level, this bundle has everything you need to succeed. So why wait? Enrol today and start your journey towards success in the tech industry! This CompTIA A+ (220-1002) Bundle Package includes: Course 01: Advanced Diploma in CompTIA A+ (220-1002) at QLS Level 7 10 Premium Additional CPD QS Accredited Courses - Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 03: CompTIA Network+ Certification (N10-007) Course 04: Computer Science With Python Course 05: Computer Networks Security from Scratch to Advanced Course 06: CompTIA PenTest+ (Ethical Hacking) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: Linux Security and Hardening Course 09: MD-100: Windows 10 Course 10: Building Your Own Computer Course Why Prefer This CompTIA A+ (220-1002) Bundle? You will receive a completely free certificate from the Quality Licence Scheme Option to purchase 10 additional certificates accredited by CPD Get a free Student ID Card - (£10 postal charges will be applicable for international delivery) Free assessments and immediate success results 24/7 Tutor Support After taking this CompTIA A+ (220-1002) bundle courses, you will be able to learn: Gain a comprehensive understanding of the CompTIA A+ (220-1002) course Develop foundational knowledge of IT fundamentals and cybersecurity analysis Learn about computer science with Python, building your own computer, and cloud computing Gain in-depth knowledge of computer network security, Linux security, and Windows 10 Develop skills in ethical hacking and penetration testing Understand the importance of information and communication technology in the tech industry ***Curriculum breakdown of CompTIA A+ (220-1002)*** Section 01: All About the CompTIA A+ 2019 Core 2 Exam Section 02: Safety and Professionalism Section 03: The Visible Computer Section 04: CPUs Section 05: RAM Section 06: Power Supply Section 07: Implementing Mass Storage Section 08: Building a PC Section 09: Windows under the Hood Section 10: Users, Groups, and Permissions Section 11: Maintaining and Optimizing Operating Systems Section 12: Working with the Command-Line Interface Section 13: Troubleshooting Operating Systems Section 14: Display Technologies Section 15: Essentials of Networking Section 16: Local Area Networking Section 17: Wireless Networking Section 18: The Internet Section 19: Portable Computing Section 20: Care and Feeding of Mobile Devices Section 21: Securing Computers Section 22: Operational Procedures How is the CompTIA A+ (220-1002) Bundle Assessment Process? You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you successfully pass the exams. CPD 280 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This bundle is perfect for: Tech enthusiasts looking to develop a broad range of skills IT professionals seeking to expand their knowledge and earn CPD-QS accreditation Students interested in pursuing a career in the tech industry Anyone looking to gain a competitive edge in the job market Career path Our courses will prepare you for a range of careers, including: Help Desk Technician: £18,000 - £24,000 per year Network Support Specialist: £25,000 - £40,000 per year Cybersecurity Analyst: £30,000 - £50,000 per year Cloud Systems Administrator: £35,000 - £55,000 per year IT Project Manager: £45,000 - £70,000 per year Chief Information Officer: £80,000 - £150,000+ per year Certificates Advanced Diploma in CompTIA A+ (220-1002) at QLS Level 7 Hard copy certificate - Included CPD QS Accredited Certificate Digital certificate - Included Upon successfully completing the Bundle, you will need to place an order to receive a PDF Certificate for each course within the bundle. These certificates serve as proof of your newly acquired skills, accredited by CPD QS. Also, the certificates are recognised throughout the UK and internationally. CPD QS Accredited Certificate Hard copy certificate - Included International students are subject to a £10 delivery fee for their orders, based on their location.

CompTIA A+ (220-1002) - CPD Certified
Delivered Online On Demand4 weeks
£159

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

ISO 27001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course

ISO 27001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Safety, Security & Situational Awareness for Women (S3AW)

By Stirling Defence

Be prepared, not paranoid! Course curriculum What are we going to teach you? 1 Instructions for this course Enrollment Process Trouble Shooting 2 Welcome to Safety, Security & Situational Awareness for Women How to use the course player 3 Let's get started! The Why Lesson 1 - Introduction to Safety, Security, Situational Awareness for Women Lesson 2 - Principles of Real-time Behaviour Lesson 3 - How to Recognise Threats through Behaviour Observation Test Lesson 4 - The Predator Mindset Lesson 5- The Dynamics of the Brain Lesson 6 - Indicators of Spiking, Common Date Rape Narcotics and their Effects. Lesson 7 - Colour Coded Risk Evaluation Final Assessment Training and Evaluation Feedback Form 4 Next Steps... Before you go... Recommended Reading List

Safety, Security & Situational Awareness for Women (S3AW)
Delivered Online On Demand
£45

CyberSecurity Law Online Course

4.7(160)

By Janets

Register on the CyberSecurity Law Online Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CyberSecurity Law Online Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CyberSecurity Law Online Course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CyberSecurity Law Online Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Introduction to Cyber Law Introduction to Cyber Law 00:05:00 Module 02: Cyber Law, Cyber Ethics and Online Gambling Cyber Law Cyber Ethics and Online Gambling 00:05:00 Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Cyber Security and Trust in Cyberspace 00:10:00 Module 04: Threat Factors: Computer as a Target Threat Factors Computer as a Target 00:10:00 Module 05: Threats to Cyber Security by Criminals and Organised Crimes Threats to Cyber Security by Criminals and Organised Crimes 00:05:00 Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Threats to Cybersecurity by Hacktivists and Nation-States 00:15:00 Module 07: Cyberterrorism Cyberterrorism 00:10:00 Module 08: An Evolving Threat: The Deep Web An Evolving Threat The Deep Web 00:10:00 Module 9: Fraud Fraud 00:10:00 Module 10: Jurisdiction Jurisdiction 00:05:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

CyberSecurity Law Online Course
Delivered Online On Demand1 hour 25 minutes
£25

Cyber Security

By Twig Services Ltd

Cyber Security Online Training Course

Cyber Security
Delivered Online On Demand25 minutes
£29

Definitive H.323 for engineers

5.0(3)

By Systems & Network Training

H.323 training course description A hands on course covering IP telephony with H.323. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on H.323 protocols though, progressing from what H.323 is through signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, conferencing, and interoperability. Hands on practicals follow each major theory session. What will you learn Explain how H.323 works. Analyse H.323 packets. Deploy H.323 IP telephony solutions. Integrate H.323 with other telephony solutions. H.323 training course details Who will benefit: Technical staff working with H.323 Prerequisites: Voice Over IP Duration 2 days H.323 training course contents VoIP review Brief review of VoIP, IP, telephones and voice. RTP, RTCP, mixers and translators. What is H.323? The framework, Why H.323, history, H.323 standards and the ITU, H.323 versions 1,2,3,4, and 5, Annexes and Appendices, capabilities, services, How H.323 works, a basic call. H.323 protocol stack The overall framework, Audio codecs (H.7xx), Video codecs (H.26x), T.120 data conferencing. H.323 Architecture Endpoints: Terminals, MCUs, gateways. Gatekeepers, border and peer elements, design issues, signalling with and without gatekeepers. H.225 Packet format, ASN.1, Information elements, Call setup, Call control. Gatekeepers Gatekeeper features, admissions, address translation, bandwidth management, call routing, zones, administrative domains, gatekeeper discovery, call establishment, fast connect. RAS packet formats, RAS signalling. Alternate gatekeepers. H.245 Purpose, call control channel, relationship with H.225, message format, tunnelling. H.323 Supplementary services Conferencing: point to point, multipoint, hybrid, broadcast, H.332. H.450.x. Call transfer, diversion, hold and waiting. Remote device control (H.282, H.283). Capability exchange, Video. Security H.235. Authentication, privacy, transport layer level security. Interoperability Gateways, Inter working with PSTN, SIP and H323. H.246. Annexes and Appendices An overview.

Definitive H.323 for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Close Protection & Bodyguard Training

By Compliance Central

Are you ready for a career that combines excitement, responsibility, and impressive earning potential? In the UK, the demand for highly trained close protection professionals continues to grow, with an increasing need for personal security services in various sectors. As a highly trained Close Protection & Bodyguard professional, you'll be at the forefront of safeguarding VIPs, executives, celebrities, and high-profile individuals. Experience the thrill of ensuring their safety while earning hourly rates of up to £50. Join the elite ranks of close protection experts and make your mark on the world of celebrities. Start your Close Protection & Bodyguard Training journey today! Our close protection and bodyguard training course provides a solid foundation in all aspects of close protection, including threat assessment, route planning, and legal considerations. With a focus on useful close protection & bodyguard skills and real-world scenarios, students will develop the expertise required to handle high-pressure situations and provide professional security services. Get 6 CPD Accredited Close Protection & Bodyguard Training Courses for only £41 Course 01: Close Protection Course 02: Bodyguard Training Course 03: Security Management Course 04: Lifeguard Training Course 05: Criminal Intelligence Training Course 06: Basic Life Support (BLS) Certification Close Protection & Bodyguard Training Learning Outcomes: Understand close protection principles and team roles. Develop threat assessment and security implementation skills. Gain proficiency in vehicle drills, route selection, and reconnaissance. Acquire bodyguard training knowledge and techniques. Develop effective security management strategies. Obtain lifeguard skills and knowledge. Gain expertise in criminal intelligence training and investigation. Obtain Basic Life Support (BLS) certification for emergency medical care. Close Protection & Bodyguard Training Curriculum Breakdown of the Close Protection & Bodyguard Training Bundle Curriculum Breakdown of Close Protection Module 01: Introduction to Close Protection Module 02: The Close Protection Team Module 03: The Planning Module 04: Threat Assessment Module 05: Vehicle Drills: Embus and Debus Module 06: Route Selection and Reconnaissance Module 07: Legislation Regarding Close Protection Curriculum Breakdown of Bodyguard Training Module 01: Introduction to Bodyguard Training Module 02: Personal Security Module 03: Laws and Legislation Module 04: Threat Assessment and Risk Management Module 05: Operational Planning and more... Curriculum Breakdown of Security Management Module 01: Introduction to Security Management Module 02: Organisational Security Management Module 03: Security Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management and more... Curriculum Breakdown of Lifeguard Training Module 01: Professional Lifeguard Module 02: Lifeguard Observation Module 03: Safety and Risk Management Module 04: Emergency Response Activity Module 05: Assists and Rescues and more... Curriculum Breakdown of Criminal Intelligence Training Module 01: Introduction to Intelligence Analysis Module 02: Criminal Intelligence Analysis Module 03: Criminal Intelligence Analyst - Skills and Competencies Module 04: Understanding Criminal Psychology Module 05: Research Methods in Crime Analysis and more... Curriculum Breakdown of Basic Life Support (BLS) Certification Module 1. Introduction to Basic Life Support Module 2. Basic Life Support for Adults Module 3. Basic Life Support for Children Module 4. Basic Life Support for Infants Module 5. Cardiopulmonary Resuscitation Objectives and more... CPD 60 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is designed for individuals seeking comprehensive training in close protection and bodyguarding. It is suitable for aspiring close protection officers, security personnel, law enforcement professionals, and individuals interested in pursuing a career in personal protection. Career path Close Protection Officer - £30-60k/year Executive Protection Specialist - £40-80k/year Private Security Consultant - £35-70k/year Security Operations Manager - £35-60k/year Personal Security Detail Supervisor - £45-85k/year Certificates Certificate of completion Digital certificate - Included Get 6 CPD accredited PDF certificate for Free. Certificate of completion Hard copy certificate - £9.99 Get 6 CPD accredited Hardcopy certificate for £9.99 each. The delivery charge of the hardcopy certificate inside the UK is £3.99 each, and international students need to pay £9.99 each to get their hardcopy certificate.

Close Protection & Bodyguard Training
Delivered Online On Demand22 hours
£25