• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

77 Educators providing Security courses in Nailsea

Safelives

safelives

Bristol

Our Chief Executive, Suzanne Jacob OBE, leads the below senior leadership team (SLT) and overall operational management of SafeLives. The SLT is assisted by a team of dedicated professionals with a variety of backgrounds and experiences. Suzanne Jacob OBE, CEO Having worked at SafeLives for three years – including two years as Deputy CEO – Suzanne became Chief Executive in December 2017. Immediately before joining SafeLives, Suzanne spent several months working in Delhi for Breakthrough India, an organisation which campaigns against violence and discrimination against women and girls. Prior to this, Suzanne spent nearly a decade with the UK Home Office. Here, she worked extensively on national security matters, established the National Crime Agency as a significant new part of UK law enforcement, and acted as Private Secretary to the Minister responsible for crime and policing. Suzanne worked for several years on security for the London 2012 Olympics, and was awarded an OBE in 2013 for her work on intelligence collection and analysis, and enforcement activity. Suzanne volunteered for seven years on the Victim Support helpline, providing first response for victims of all crime types. She became a Trustee of Crimestoppers UK in April 2021. Jo Silver, Director of Quality and Innovation Jo is responsible for designing and piloting exciting new and effective interventions to end domestic abuse. Jo provides expert advice on activities, policy messages and practice, she works with national and local commissioners, funders, policy makers and partners to make this happen. Jo rejoined us in January 2014, having spent two years as senior consultant at the NSPCC in Cardiff. Jo was Caada's (SafeLives' former name) director of professional development between 2006 and 2012. She also worked for the police for ten years in the public protection unit and at the Women's Safety Unit in Cardiff. Jo Gordon, Chief Operating Officer Jo is responsible for effective and efficient internal management of the organisation, making sure that SafeLives lives by its values of being human, rigorous and brave. Jo took up the role of Chief Operating Officer in July 2018. Prior to this, Jo was Head of Learning and Accreditation at SafeLives having joined in 2005 as a freelance trainer. Jo started her career as a youth and community worker. She worked for ten years at North Devon Women’s Aid prior to SafeLives and is committed to tackling the issue of domestic abuse. Jo is also a volunteer at her local homeless shelter. Liz Thompson, Director of External Relations Liz is responsible for our external relations activity, working with colleagues to forge and maintain great relationships with the wide array of people who are vital to our work; find new opportunities to develop and replicate what we do; and secure the support and income we need to help people and their families live safely and well. She joined in 2019, following a decade leading communications for the Royal Shakespeare Company. She started her career in the commercial sector at public relations agency, Burson-Marsteller, and her previous experience includes external relations, fundraising and management roles in the public sector, at the Environment Agency and Countryside Commission, and at the charity Turning Point. She also trained as a volunteer substance misuse counsellor at Addaction, and worked at their first needle exchange in Bethnal Green.

The Key - Unlock Potential

the key - unlock potential

London

The Key Unlock Potential is a Bristol-based charity founded by volunteers who were recruited by The Restore Trust. The charity was registered in July 2019, registration number 1184633. Our team is made up of board members including representatives from the Restore Trust and HMP Bristol and volunteers. Find out more on our team page → The story so far The charity was registered by Suzanne Thompson of the Restore Trust Bristol in response to a need to reduce reoffending by providing access to work. Prisoners reported that on release from prison, they face huge challenges in obtaining paid employment. The charity name was chosen by a focus group in the prison, and the board continue to value the importance of the voice of those with lived experience. The Key facts Many people with convictions struggle to obtain work. According to gov.uk, just 17% of ex-offenders secure a job within a year of release. A YouGov survey commissioned by the DWP found that 50% of employers would choose not to employ ex-offenders, deeming them unskilled and untrustworthy. This is despite 86% of companies that employ ex-offenders rating them as “good at their job”, and 81% of consumers stating that companies who employ ex-offenders are positively contributing to society. The lack of stability and lack of security due to unemployment creates a cycle of reoffending and makes successful rehabilitation much more challenging. This must change, and as the statistics above illustrate, tackling this problem can be beneficial for all parties involved. Food with conviction Our vision is to create a safe, welcoming café and retail hub on Bristol’s Gloucester Road that will provide a steppingstone for people transitioning into permanent employment, a destination for the local community, and a mechanism for fundraising. The food for the café will be prepared in the prison’s commercial kitchen, by prisoners. The cafe will operate 5 days a week and will be open between 8:30am and 5:30pm serving “food with conviction”. Interspersed within the café area will be art and handmade items for sale. This will include garden furniture made from pallets, including tables and planters as well as products such as keep cups and cotton bags designed and printed in the prison. We will provide paid employment placements for people released on temporary licence (RoTL) or who have recently left prison. This will help address the most pressing issues facing the prison population, by providing access to work experience and employment, training and rehabilitation support; as a result, beneficiaries will develop transferable skills that will enable them to move on to permanents jobs. Our vision is Key We are on a mission to help people rebuild their lives after they leave prison. We want to give people the tools they need to unlock confidence, pride, and positivity. We want to create a safe space for personal growth and practical experience that will enable people to secure future employment, financial stability, and break the cycle of reoffending.

Property SQ2

property sq2

BEST PRACTICE TRAINING IN THE PROPERTY INDUSTRY   Property SQ2 Limited is a leading provider of online education and training courses related to the property business.  We proud members of the Property Educators Accreditation Scheme. Between us we have 25 years experience in Property Investment and the Property Industry, and over 20 years experience training people in skills and techniques for best practice in the industry via a combination of face to face, live online, on demand and 1-2-1 training events. TAKE CONTROL OF YOUR FINANCIAL FUTURE From building a retirement pot, to replacing your current income. Property is the vehicle to create financial freedom, choice and security Drawing on over 30 years of property and business experience with over 20 years of training, coaching and mentoring people in property investment strategies,  Our training courses and 1-2-1 coaching and mentoring solutions are here to help you succeed in the property business. Whatever your goal, whatever your background, whatever your experience. Whether you want to... * Build a safe and sustainable portfolio to bolster your retirement pot * Create a passive income to generate job-leaving level profits * Learn how to add value and recycle your precious savings through multiple property deals * Need a way into the property industry without a big deposit we can help. ARDEN HANLEY                                                                          Arden Hanley is a property investor, business owner, consultant and trainer. Having experience across multiple property investment strategies and related businesses such as lettings management, sourcing and property consultancy. A landlord and business owner for 20 years, trainer, mentor and coach to the property industry for 12 years, member of the Property Educators Accreditation scheme, Arden has not only extensive experience in the industry, but also a track record of using that experience to train others to achieve their property goals. Buy To Let & Social Housing  With previous buy-to-let experience in Australia, Arden was immediately drawn to this as a primary strategy. Today, Arden has an extensive buy to let portfolio in the UK that he has built in Northampton, Nottingham and Hull. He has a range of houses for family lets, rented to both working tenants and within the social housing sector, and flats serving the young professional market. Arden says, “I think buy to let is the foundation of any successful property portfolio and this part of my portfolio was what allowed me to first achieve financial freedom. I think every investor needs to learn the fundamentals of buy to let, even if they ultimately choose to focus on other strategies within their portfolio because there are so many simple but important lessons to learn around being a good landlord and managing tenants effectively that you get from understanding this core strategy.”  HMO & Rent To Rent                         HMO was a natural progression from initial Buy to Let purchases to “increase my cash flow and take advantage of market conditions in my target area at that time being Nottingham.” With an extensive HMO portfolio, his preference are a larger number of smaller HMOs i.e. 4-6 tenants rather than a smaller number of large HMOs, although he has experience of both. How can an investor make this strategy work for them? “I believe HMO provides an excellent income stream and if done correctly can be a very stable income stream as well. I think the key to a successful HMO is setting it up correctly from the outset to make it as attractive and user friendly for tenants, and identify potential cost centres or savings before tenants go in and empowering my lettings agents to put together the right tenant mix to create a harmonious environment.”  Distressed Property & Adding Value  Every property that Arden has purchased has been distressed to some degree, as he says “I believe this is the one true route to make money out of property.” He has applied the lessons he has learnt on smaller projects as he has moved on to larger more complex investment properties. It’s also given him the opportunity to work with distressed sellers which he regards as a core skill in a property investor’s arsenal. As Arden says, “With a distressed seller, you are a solution provider trying to create a win/win situation where you can offer a route for the seller to sell the property that removes their financial burden, while at the same time offering an opportunity for you as an investor to make a fair profit.”  Commercial to Residential & Development                         As his confidence has grown, so has Arden’s willingness to commit to more complicated projects and he has successfully adopted commercial to residential conversions as a strategy since 2013 primarily working with either disused retail or office space which is in abundance in the UK. It’s not hard to see the appeal, as Arden says, “I find that there is a huge opportunity for value uplift in this strategy as the closer you get to effectively a shell, the more opportunities you have to make money.’                     Portfolios                    There are a number of options for approaching the acquisition of a portfolio, whether it’s title splitting a block of flats, via a freehold/leasehold strategy, organising a share buyout of a property company, or structuring a staggered sale to maximise buyer and seller value and tax savings. Arden has experience dealing with the simple acquisition of a portfolio to the complex and sometimes challenging world of dealing with portfolios in trouble, direct to owners, via agents, liquidators or administrators.                     Complimentary businesses and deal structuring  Having an interest in a lettings agency, experience running a sourcing business/property consultancy for 7 years and working with multiple business partners has taught Arden the value of building business clusters to support each other and working with business partners and private investors to make business happen. ‘Property deals can come together from your own resources, time and effort, but as your ambitions grow and the opportunities get bigger, it’s important to think about how private finance and joint ventures can create profit for you and your partners. I’d rather have a cut of something than the whole of nothing.’  Mentorship & Training               For Arden, it’s an honour to be invited to mentor to share his knowledge with others which provides enormous, personal satisfaction. Even though he’s not naturally outgoing, Arden admits that “As a self-confessed property geek, if you ask me questions about property, I’m happy to talk for days.” He encourages his mentees to “Soak up as much as you can from people who have done it before and been successful. Soak up the knowledge for sure, but also the motivation and mindset.” He concludes, “I don't think there is any better way to start in property than to work side by side with someone who has been where you are starting from and has proved how to make it work.”  CHRIS CORMACK Chris Cormack is a property investor and business owner with a vast experience working with people to develop their property investments and business growth. Helping people to succeed has been a large part of his business focus over the last 16 years as a mentor, trainer and coach. His understanding of the industry through building his own portfolio across a range of strategies enables him to work with clients around their goals so they achieve whichever outcome they are looking for. Chris is recognised within the property industry and is member of the Property Educators Accreditation scheme. From a standing start in November 2004 Chris built his property business across various strategies within the property industry. Property had a great appeal for 5 reasons: 1. Being his own boss  2. Recurring monthly income  3. Large lump sums of income 4. Long term capital growth 5. Opportunity to help others benefit from the same reasons 1-4. BUY TO LET & SOCIAL HOUSING  Chris believes "Buy To Lets are the foundation to any successful property portfolio because it's the quickest way to generate income while you learn the initial fundamentals of the business. Demand is high across the country for BTL which other strategies don't necessarily have. Within our portfolio we have a wide mix of tenants including families, couples, singles as well as fixed term guaranteed social housing contracts." Understanding the industry and our responsibilities is paramount and gives us the necessary grounding to progress income across other strategies. A number of his properties have been used as serviced accommodation through a commercial contract. These have resulted in guaranteed income, ensuring a hands off pain free outcome. HMO  Chris continues "For larger income, having HMOs brings considerable changes to your monthly bank account which was our natural progression. A major learning moving into HMOs was all the necessary fire requirements and additional management needs. These of course add costs which are not present with your BTL's. Having this knowledge prior to committing to this strategy is important along with a deep understanding of who will be your tenant market. Generally this is less flexibility so more targeted research initially is imperative to achieve your successful outcome. ADDING VALUE & FLIPS Lump sums of income is an area Chris has targeted when buying properties, modernising them and selling them. A key component to achieve these returns is looking to see where true value can be added, increasing value is paramount here. His view on this is that while it generates substantial income it also gives the opportunity to allow faster growth within his portfolio. Having addition capital to invest gives a wider deal choice and opportunities to structure deals. "Having greater tools while in front of a motivated seller allows you the facility to be more creative especially if you can offer a solution to their current situation." STRUCTURING SOLUTIONS  Over the years he has been able to structure deals which has helped the seller which in turn helped him dramatically reduce initial capital to acquire the property. "The key is to focusing on them, the seller and come to a win, win scenario." Achieving this has added numerous properties to the portfolio.  With a deal seeing what is really there gives Chris an edge. Where most people see a single outcome in a deal Chris likes to look for multiple outcomes across strategies. As his experience has developed the confidence has taken him into larger projects which can deliver multiple opportunities. Understanding the finance and tax implication can give additional advantages. Having bought a portfolio with land created multiple flip opportunities which resulted in the land cost him nothing, free land. Having free land gave him further choices around planning. Sell with planning or build out and sell with a decision based on whichever gives the greater return for time/money invested. MENTORSHIP, COACHING AND TRAINING Chris has been mentoring property investors since 2007. He himself had the benefit of a mentor and fully understands how it accelerates your portfolio growth, "money well spent" and that's from a Scotsman....! "It was a privilege to be asked and was something I had wanted to do, so I enthusiastically jumped at the chance." Being able to pass on market experience, as well as working with people to develop the best strategy for them is extremely rewarding. Sometimes it's the smallest thing that creates the biggest impact and it does not matter if you are new or have some experience in property, accessing another person's experience is a springboard to a new set of outcomes, for the better. 

Janet Haigh

janet haigh

Bristol

I am a freelance designer-maker, applied artist, crafts-woman, whatever you want to call me – I stitch stuff by hand; fabric, metal, porcelain, leather, vitreous enamel.. . My work is various, it depends whether I am working for myself, to commission or collaborating with other artists. But whatever I do is slow to make; detailed hand stitching in any material whether in silk, linen, wool or wire takes time, consequently my work is also slow to evolve. I decided to show on this site what I do, who I am work with, how I work and also how I think. I want to show the work behind HER WORK not just the finished things. The journey from the first idea, searching, researching, drawing, sampling and eventually making the finished piece. You will be able to watch my work progress, or not; maybe by seeing this record people will come to value making that is manufactured by hand, heart and eye. In May 2010 I developed – Heart Space Studios ( from my yoga practice “Put your Hands in your Heart Space”) and for 5 years it was a space in Bristol England for all things textile. The activities at the studios can still be viewed – I closed the studio workshops in 2015 – the classes remain on this site as part of the blog, they contain many of my most popular posts….. Heart Space Studios continues as a group of makers who develop projects primarily for publishing companies. Most notably we work with designer Kaffe Fassett in the production of his patchwork quilt books and other fabrics.

1...678

Courses matching "Security"

Show all 358

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cyber Security Overview 1 Day Training in Bristol

By Mangates

Cyber Security Overview 1 Day Training in Bristol

Cyber Security Overview 1 Day Training in Bristol
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Newport

By Mangates

Cyber Security Overview 1 Day Training in Newport

Cyber Security Overview 1 Day Training in Newport
Delivered In-Person + more
£595 to £795