• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4916 Security courses

Cyber Security Threats by Criminals and Organised Crime

By NextGen Learning

Dive into the dark corners of the digital realm with this "Cyber Security Threats by Criminals and Organised Crime" course. Embark on an exciting journey through the underbelly of cyberspace, where cyber law, ethics, and trust collide. Unveil the sinister tactics employed by hackers, hacktivists, and even nations, as you navigate the treacherous landscapes of cybercrime, terrorism, and fraud. Are you ready to confront the shadows? Enrol today! Learning Outcomes: Understand the foundations of cyber law and its relevance in combating cybercrime. Recognise the ethical implications of cyber activities, particularly in the context of online gambling. Gain insights into the intricate relationship between cybercrime, cybersecurity, and trust in the digital world. Identify the various factors that make computers vulnerable targets for cyber threats. Analyse and assess the different cyber threats posed by criminals, organised crime, hacktivists, and nation-states. Explore the realms of cyberterrorism, the deep web, fraud, and the jurisdictional challenges in cyber law enforcement. This comprehensive course takes you on an intellectual journey through the intricacies of cyber law, cyber ethics, and their entanglement with online gambling. Uncover the dark underbelly of cybercrime as you delve into the ever-expanding threats faced by individuals, organisations, and nations in the digital landscape. From computer vulnerabilities to the machinations of cybercriminals and organised crime syndicates, this course unveils the nuanced world of cyber threats with meticulous attention to detail. Explore the treacherous territories of cyberterrorism, where the boundaries between the virtual and real worlds blur. Unravel the mysteries of the deep web, where hidden dangers and evolving threats lurk beneath the surface. Gain invaluable insights into fraud and its impact on the digital ecosystem, while navigating the complex maze of jurisdictional challenges faced by cyber law enforcement. This Cyber Security course equips you with the understanding and awareness necessary to protect yourself and society against cyber threats. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is perfect for: Professionals seeking to enhance their knowledge of cyber law and cybersecurity. Law enforcement officers involved in tackling cybercrime. Students and researchers interested in understanding the intricacies of cyber threats. Individuals responsible for safeguarding digital assets and privacy in their organisations. Career path Our course will prepare you for a range of careers, including: Cybersecurity Analyst: £30,000 - £50,000 per annum Cybercrime Investigator: £35,000 - £60,000 per annum Cybersecurity Consultant: £40,000 - £70,000 per annum Digital Forensic Analyst: £35,000 - £60,000 per annum Incident Response Analyst: £35,000 - £60,000 per annum Cybersecurity Manager: £50,000 - £90,000 per annum

Cyber Security Threats by Criminals and Organised Crime
Delivered Online On Demand2 hours
£15

Definitive OpenSSL for engineers

5.0(3)

By Systems & Network Training

OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.

Definitive OpenSSL for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

The Ultimate Guide to Event Planning - 1 Day Workshop in Luton

By Mangates

Event Planning 1 Day Training in Luton

The Ultimate Guide to Event Planning - 1 Day Workshop in Luton
Delivered In-Person + more
£595 to £795

Offensive Hacking Unfolded - Become a Pro Pentester

By Packt

A beginner-friendly course for aspiring pentesters with 10+ hours of applied ethical hacking and security content covering core concepts such as using VMware, basics of Linux, Nmap, Metasploit, privilege escalation, known vulnerabilities, SQL injections, pivoting, cracking passwords, and much more. You need to know the basics of Linux and networking to get started.

Offensive Hacking Unfolded - Become a Pro Pentester
Delivered Online On Demand10 hours 19 minutes
£82.99

Security Management & Investigation

4.7(160)

By Janets

Follow your dreams by enrolling on the Security Management & Investigation course today and develop the experience, skills and knowledge you need to enhance your expert development. Security Management & Investigation will help you arm yourself with the qualities you need to work towards your dream job. Study the Security Management & Investigation training course online with Janets through our online learning platform and take the first steps towards a successful long-term career. The Security Management & Investigation course will allow you to enhance your CV, impress potential employers, and stand out from the crowd.  This Security Management & Investigation course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Study the Security Management & Investigation course through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the Security Management & Investigation course, to ensure you are supported every step of the way. Get a digital certificate as proof of your Security Management & Investigation course completion. Janets is one of the top online training course providers in the UK, and we want to make education accessible to everyone! Learn the essential skills you need to succeed and build a better future for yourself with the Security Management & Investigation course. The Security Management & Investigation course is designed by industry experts and is tailored to help you learn new skills with ease.  The Security Management & Investigation is incredibly great value and allows you to study at your own pace. With full course access for one year, you can complete the Security Management & Investigation when it suits you. Access the Security Management & Investigation course modules from any internet-enabled device, including computers, tablets, and smartphones. The Security Management & Investigation course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the Security Management & Investigation now and start learning instantly! What You Get Out Of Studying Security Management & Investigation With Janets: Receive a digital Certificate upon successful completion of the Security Management & Investigation course Get taught by experienced, expert instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Description The Security Management & Investigation training course is delivered through Janets' online learning platform. Access the Security Management & Investigation content from any internet-enabled device whenever or wherever you want to. The Security Management & Investigation course has no formal teaching deadlines, meaning you are free to complete the course at your own pace. Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99.00. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment To successfully complete the course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the course. After successfully passing the exam, you will be able to apply for Quality Licence Scheme endorsed certificate of achievement. To verify your enhanced skills in the subject, we recommend that you also complete the assignment questions. These can be completed at any time which is convenient for yourself and will be assessed by our in-house specialised tutors. Full feedback will then be given on your current performance, along with any further advice or support. Who Is This Course For: The Security Management & Investigation is ideal for those who already work in this sector or are an aspiring expert. This Security Management & Investigation course is designed to enhance your expertise and boost your CV. Learn key skills and gain an expert lesson to prove your newly-acquired knowledge. Requirements: The Security Management & Investigation is open to all students and has no formal entry requirements. To study the Security Management & Investigation course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Career Path: The Security Management & Investigation is ideal for anyone who wants to pursue their dream career in a relevant industry. Learn the skills you need to boost your CV and go after the job you want. Complete the Security Management & Investigation and gain an industry-acknowledged lesson that will help you excel in finding your ideal job. Course Content Module 01: Introduction to Security Management Introduction to Security Management 00:33:00 Module 02: Organisational Security Management Organisational Security Management 00:27:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:26:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:37:00 Module 05: Business Resilience and Crisis Management Business Resilience and Crisis Management 00:19:00 Module 06: Cyber Security and Fraud Prevention Cyber Security and Fraud Prevention 00:26:00 Module 07: Security Investigations and Threat Awareness Security Investigations and Threat Awareness 00:25:00 Module 08: Laws and Regulations Laws and Regulations 00:29:00 Mock Exam Mock Exam - Security Management & Investigation 00:20:00 Final Exam Final Exam - Security Management & Investigation 00:20:00 Assignment Assignment - Security Management & Investigation 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Security Management & Investigation
Delivered Online On Demand3 weeks
£25

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

Level 3 Physical Intervention (Trainer) Course

By Canary Wharf Academy

Course Description: Prepare for a career in Security Industry with our Level 3 Physical Intervention Training course. Designed to equip trainers with the knowledge and skills to safely deliver physical intervention techniques, this course is highly regarded by major security organizations, event operators, and door supervisors. Course Overview: Gain expertise in safely delivering a range of physical intervention techniques and associated factors. Our comprehensive curriculum covers primary control skills, pressure point applications, balance displacement methods, and more. Tutor support is provided throughout the learning phase to ensure mastery of technical skills and principles. Course Assessment: Assessment includes demonstrating physical intervention techniques, a multiple-choice exam at the end of the 2-day classroom course, and submitting a portfolio assignment. Course Fee: Enroll in our Level 3 Physical Intervention course for £649.99, including all charges. Upon successful completion, receive a certificate and PI Licence Agreement. Corporate or Group Booking: Enjoy special discounts on corporate or group bookings. Our experienced trainers can conduct training sessions at your location. Contact us to arrange your corporate or group booking. How to Book: Book online via PayPal, debit/credit card, invoice, or bank transfer. Alternatively, visit our office or contact us by phone to secure your spot. Booking confirmation will be emailed instantly. Assistance Needed? For any inquiries or assistance, our dedicated team is available via phone or email. We're committed to supporting you throughout your learning journey. Contact us today for guidance and support.

Level 3 Physical Intervention (Trainer) Course
Delivered In-PersonFlexible Dates
£649.99

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Web Hacking Secrets - How to Hack Legally and Earn Thousands of Dollars at HackerOne

By Packt

Master web application security testing and become a successful bug hunter

Web Hacking Secrets - How to Hack Legally and Earn Thousands of Dollars at HackerOne
Delivered Online On Demand6 hours 12 minutes
£149.99