This course is designed to help you understand the basic and advanced concepts of ethical hacking with ease. The course features interesting examples and coding activities in each video to keep you engaged and guides you effectively through writing programs to hack a system.
Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:05:00 Virtual Lab Build Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and Lab -Creating a Virtual install of Kali using VirtualBox 00:12:00 Video and lab - Create a virtual install of Metasploitable2 00:10:00 Video and Lab - Creating Windows 7 Pro Target Machine Using VirtualBox 00:07:00 Video and Lab - Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Installing the VirtualBox Extension Pack 00:02:00 NMap Installing the WebMap-Nmap Dashboard 00:12:00 Automated Recon/Enumeration Using nmapAutomator 00:10:00 Enumerating a Windows 10 Target Creating a Vulnerable Windows 10 Target 00:04:00 Reverse Shells, Privilege Escalation and Persistent Backdoors. Create a Windows Reverse Shell Using the PowerShell 00:08:00 Create a Reverse Shell Using Command Injection 00:06:00 Create a Reverse Shell Using a File Upload 00:08:00 Launch an Automated Meterpreter Session 00:13:00 Upgrade a Dumb Terminal to Fully Functional BASH Shell 00:09:00 Windows 7 Privilege Escalation Using UAC Bypass 00:05:00 Creating a Persistent Backdoor Using a Persistent Service 00:14:00 PowerShell Empire Create Virtual Install of Server 2016 Full GUI Using VirtualBox 00:12:00 00:09:00 Installing PowerShell Empire StarKiller On Kali Linux 00:05:00 Enumerating Active Directory 00:15:00 Post-Exploitation of Windows Using PowerShell Empire 00:19:00 Post Exploitation of Microsoft Windows Advanced Password Hacking with Metasploit 00:13:00 Post-Exploitation of Microsoft Windows 00:13:00 Brute Force the SMB Password on a Windows Server 00:10:00 Enumerating Active Directory Using RPCClient 00:16:00 Dumping Wi-Fi Credentials Using netsh 00:04:00 Practical Pentesting Labs Heartbleed OpenSSL Exploit Vulnerability 00:17:00 Performing an RDP Brute Force Attack 00:14:00 Exploiting Active Directory using LLMNR/NBT-NS Poisoning 00:11:00 Accessing Kali Across the WAN with NGROK 00:15:00 Pentesting with Netcat 00:12:00 Enumerate DNS Records Using DNSRecon 00:12:00 Auditing Wireless Networks Installing a Wireless Adapter in Kali 00:09:00 Hacking a Wireless Network Using Kali Linux 00:14:00 Wireless Deauthentication Attack 00:06:00 PMKID Client-less Wireless Attack Using Bettercap 00:10:00 Wireshark Overview of Wireshark 3.2 00:10:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:03:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Web App Penetration Testing Creating a virtual install of OWASP 00:05:00 Setting Up Burp Suite 00:09:00 Attack Web Apps with Burp Suite Using SQL Injection 00:11:00 OS Command Injection Using Commix 3.2x 00:16:00 Web Application Firewall Detection Using WAFW00F 00:04:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Using Banner Grabbing to Aid in Reconnaissance 00:10:00 Anonymity - Remaining Anonymous While Pentesting Anonymize Kali Using Whonix 00:10:00 CTF - SQL Injection to Shell Walkthrough Lab Preparation for CTF SQL Injection to Shell 00:04:00 CTF Walkthrough for SQL Injection to Shell 00:13:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Description: If you are a non-techie interested in learning about computer networks or an aspiring IT professional who wish to better understand how networks work then get all the information you need here. This course has been designed to equip students with a wide range of software, technical and ICT skills required by the industry. By the end of this program, the students will have the ability to develop an IT solution to a practical business problem using a technological approach. Who is the course for? Non-Techies interested in Learning About Computer Networks Business & IT Managers Need to better understand how network works Aspiring & Inexperienced IT Professionals Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: This course would be beneficial for the following careers: Entry level technician at Telephone/ Internet Service Providers Computer sales and service technician Entry-level IT/ network technician at banks Entry-level IT/ network support technician at insurance companies Entry-level IT/ network support technician at utility companies Entry-level IT/ network support technician at energy based companies Entry-level IT/ network technician at universities Entry-level IT/ network technician at broadcast houses Entry-level IT/ network technician in the government Owner/Manager small computer business Other Entrepreneurial activity. Computer Fundamentals Basic Computer Terms 00:15:00 Advanced Terms 00:15:00 Networking Basics 00:15:00 Basic Internet Concepts 00:30:00 Internet Security 00:30:00 Computers in the Workplace 00:15:00 Tele-Commuting 00:15:00 The Electronic World 00:15:00 Ergonomics 00:15:00 Safety and the Environment 00:15:00 Being Proactive 00:15:00 Identifying Yourself 00:15:00 Protecting your Data 00:15:00 Understanding Malware 00:15:00 Protecting Against Malware 00:15:00 Computer Networking Basics Introduction to Computer Networking 00:30:00 Types of Computer Networks 01:00:00 Types of Network Equipment 00:30:00 Ethernet 00:30:00 Wireless Local Area Networking 01:00:00 Internet Service 01:00:00 TCP/IP and Other Internet Protocols 01:00:00 Network Routing, Switching and Bridging 01:00:00 IPv4 & IPv6 01:00:00 Computer Networking Concepts Basics of computer networking 00:30:00 Computer networking design and solutions 00:30:00 Getting the right computer network hardware. 01:00:00 Setting up your Computer Network 00:30:00 Wireless vs wired 01:00:00 Cable management for wired computer network 01:00:00 Managing your network with network monitoring tools 01:00:00 Computer network maintenance and repair 01:00:00 Troubleshooting computer network 01:00:00 Mock Exam Mock Exam- Level 2 Certificate in Computer Networking 00:20:00 Final Exam Final Exam- Level 2 Certificate in Computer Networking 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Course Overview Won't it be great if you could recover your lost data from your device or ensure that the hackers cannot reach you? What about tracking the hacker and get back the data they have stolen from you? Digital security has become one of the greatest concerns today. Learn how you can secure your device and find out black hat hacker criminals from this Digital Forensics for Pentesting Course and ensure data security. In this Digital Forensics for Pentesting Course, you will learn the importance of digital forensic investigation, the basics of cybersecurity, pentesting and digital forensic. You'll understand the functions of Malware and how to track them back. This course is ideal for understanding how digital devices can be hacked and how to prevent them. You will be able to understand digital forensic investigation steps with easily understandable and bite-sized lessons. Learning Outcomes Get a clear understanding of what digital forensic investigation is Be able to produce professional and legal digital forensic reports Learn to utilise various forensic tools for digital forensic investigation Properly handle digital media during the investigation Recover deleted data from various devices and operating systems Be able to track hackers malicious movement Who is this course for? This course will be helpful for anyone who wants to learn about pentesting and interested in digital forensic investigation. You will learn how to understand digital forensic investigation step by step from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Digital Forensics for Pentesting Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Digital Forensic Investigators Pentesters Data Security Officers White Hat Hackers Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Lab - Installing CSI Linux 00:13:00 Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Lab - Create a Virtual Install Kali Image Using VirtualBox 00:07:00 Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Install Additional Tool Using Katoolin3 00:10:00 Using Kali Forensic Mode and Autopsy Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Lab -Digital Forensics Using Autopsy Part I 00:11:00 Lab - Digital Forensics Using Autopsy Part II 00:07:00 Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source intelligence (OSINT) Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Lab - Find Social Media Accounts Using Sherlock 00:07:00 Computer Forensics Attaching an External USB Device in Kali 00:07:00 Lab - Memory Forensics Using the Volatility Framework 00:18:00 Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Lab - Analyzing the Windows Registry for Evidence 00:14:00 Using Shodan to Search for Vulnerable devices Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Stenography Lab - Using the EXIFtool to Read and Write EXIF Tags 00:11:00 Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network forensics Using Wireshark Overview of Wireshark 3.2 00:11:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:04:00 Lab - Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Lab - Installing a Wireless Adapter in Kali 00:09:00 Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Have learned Lab - CTF Lab Build for HA: Forensics 00:11:00 Lab - Capture flag #1 00:12:00 Lab - Capture flag #2 00:10:00 Lab - Capture flag #3 00:20:00 Lab - Capture flag #4 00:09:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Course Overview Learn how you can install, upgrade and maintain your Microsoft Windows 10 like a pro from this Microsoft Windows 10 Pro Masterclass course and make your work smooth and fast. This course will help you to understand the functions of Windows 10, configuration, management, security and many other functions and help you get the best output from your device. The easily understandable and bite-sized lessons of this Microsoft Windows 10 Pro Masterclass course will help you to understand how Windows 10 functions. You will be able to familiarize yourself with the network configuration and server domain-based environment to utilize the functions of Internet and cloud services. Even if you don't know anything about Windows 10, this course will help you to grasp the ideas and functions and use them properly. Learning Outcomes Learn how to plan, install and upgrade to Windows 10 Be able to implement networking system and remote management Understand file management and resources for your Windows 10 Familiarize with maintenance and update options of Windows 10 Get a clear understanding of local storage Ensure network security for your device Be able to troubleshoot and recover Windows 10 Who is this course for? This course is ideal for anyone who wants to understand the functions of Windows 10 and how to maintain and update their browser. You will learn various security and networking options of Windows 10 from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Microsoft Windows 10 Pro Masterclass is a useful qualification to possess and would be beneficial for any related profession or industry such as: Computer Operators Data Security Officers Troubleshooters Data Maintenance Officers IT Professionals Administrators Module 01: Course Overview Course Overview 00:05:00 Module 02: Building Your Virtual Lab Environment Easily download ISO Images 00:10:00 Lab - Creating a Virtual Install of Windows 10 Pro Using VirtualBox 00:16:00 Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox 00:13:00 Taking a Snapshot of Your Current configuration 00:04:00 Module 03: Upgrading Windows 7, 8, or 8.1 to Windows 10 Perform a Windows 10 Upgrade for Free 00:09:00 Module 04: Building a Microsoft Server 2016 Domain Preparing Your Network for Active Directory 00:10:00 Lab - Prepare Server 2016 for Promotion to a Domain Controller 00:10:00 Lab - Promote Server 2016 to a Domain Controller 00:09:00 Lab - Join a Windows 10 Workstation to a Microsoft Domain 00:15:00 Module 05: Windows Deployment Services (WDS) Installing WDS on a Windows Server Using VirtualBox 00:18:00 Deploy a Windows 10 Client Using WDS 00:09:00 lab - Create an Unattended Install of Windows 10 Pro 00:17:00 Module 06: Windows 10 Firewall, Windows Defender and UAC Turn the Windows 10 Firewall Off or On 00:01:00 Allow an app through the Windows 10 firewall 00:05:00 Add a rule or port to a Windows 10 firewall 00:05:00 Allow PING for Windows 10 00:04:00 Disable the UAC User Account Control in Windows 10 00:02:00 Using netsh to Manage the Windows Firewall 00:05:00 Using Powershell to Gather Firewall Information 00:04:00 Module 07: Networking Change your IP address in Windows 10 00:05:00 Add a second IP address in Windows 10 00:09:00 Module 08: Troubleshooting Enable System Restore on Windows 10 00:03:00 Create a System Restore point on Windows 10 00:02:00 Recover using System Restore on Windows 10 00:04:00 Fix TCPIP Corruption in Windows 10 Using Netsh 00:02:00 Repair Windows 10 with System File Checker (SFC) 00:03:00 Repair Windows 10 System files offline Using SFC 00:04:00 Use ReadyBoost to Speed up Windows 10 00:05:00 Reset Your Network Adapter 00:06:00 Lab - Troubleshooting Internet Connectivity 00:16:00 NSLookup 00:05:00 Windows Reliability Monitor 00:04:00 Module 09: User Preferences Disable the Lock Screen on Windows 10 00:03:00 Disable Superfetch via Windows Services 00:03:00 Disable Screen Saver in Windows 10 using REGEDIT 00:02:00 Disable Windows 10 Automatic Logoff For Inactivity 00:02:00 Overview of the Windows 10 Shutdown and Restart buttons 00:01:00 Module 10: Maintenance Rename your Windows 10 computer 00:01:00 Change the date and time in Windows 10 00:03:00 Create a new local user in Windows 10 00:04:00 Rearm the 30-day evaluation Period for Windows 10 Pro 00:03:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
⭐ This is a 10-week online course for toddlers (13-24months) and their parents/carers. Baby signing can benefit ANY family with a baby or toddler. Clear communication can especially reduce frustrations for families with toddlers, helping you avoid some of the toddler turbulence🌪️ before it begins.
Course Overview Learn about the functions of Microsoft Azure from this AZ-900 | Microsoft Azure Fundamentals Full Course course. The course will give you a clear understanding of the basics of Microsoft Azure and how you can use this cloud platform to grow and strengthen your online existence. In this AZ-900 | Microsoft Azure Fundamentals Full Course course, you will learn about the tools and basic functions of Microsoft Azure. You will be familiarized with the core Azure services, security, privacy and compliance policies. This course will teach you how you can secure your website and account using multi-factor authentication and protect data from hackers. This course will also help you to understand the supports Azure can offer you and get the best suitable one for you. Microsoft Azure is one of the most popular and safe cloud platforms. This AZ-900 | Microsoft Azure Fundamentals Full Course course will teach you the functions of Microsoft Azure from scratch. You don't need any prior knowledge or technical background to understand the lessons of this course. Learning Outcomes familiarize with the fundamentals of cloud services Understand the benefits of using cloud services Learn about the differences between capital expenditure and operational expenditure Be able to compare and contrast the IAAS, PAAS and SAAS service Learn about different cloud models and how they work Understand the core Azure architectural components Learn about the solutions you will get from Azure Learn about the management tools of Azure Get to know about the security and private privacy protocols of Microsoft Azure Understand how Azure identity services work Familiarize with role-based access control system Understand the policies and compliance standards in Azure Who is this course for? This comprehensive AZ-900 | Microsoft Azure Fundamentals Full Course is ideal for those who want to learn more about the functions of Microsoft Azure. You will learn about the application of Microsoft Azure and the career prospect from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path AZ-900 | Microsoft Azure Fundamentals Full Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Managers Managing Directors Management Executives Data Security Officers Programmers Microsoft Azure Developers Technicians Computer Operators Cloud Engineers Cloud Data Consultants Azure Consultants Data Scientists Course Introduction Introduction 00:04:00 Module 1 : Cloud Concepts What is Cloud Computing - I 00:05:00 What is Cloud Computing - II 00:06:00 Benefits of Cloud Computing 00:09:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 CapEx Vs OpEx 00:03:00 Cloud Models : What is Public Cloud 00:02:00 Cloud Models : Characteristics of Public Cloud 00:02:00 Cloud Models : What is Private Cloud 00:01:00 Cloud Models : Characteristics of Private Cloud 00:01:00 Cloud Models : Hybrid Cloud 00:01:00 Cloud Models : Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is IAAS 00:04:00 Use Cases of IAAS 00:02:00 What is PAAS ? 00:02:00 Use Cases of PAAS 00:04:00 What is SAAS ? 00:02:00 Cloud Models : Shared Responsibility Model 00:09:00 Module 2 : Core Azure Services Introduction 00:01:00 Azure Regions 00:01:00 Special Azure regions 00:01:00 Region pairs 00:01:00 Feature Availability Region Wise 00:01:00 Availability Zones 00:01:00 Availability Sets 00:02:00 What are Resource Groups? 00:02:00 Azure Resource Manager 00:01:00 What Next!! - Azure Core Services and Products 00:02:00 What is Azure Compute 00:01:00 Azure Virtual Machines - Audiocast Only 00:01:00 Azure Virtual Machines I - LAB 00:15:00 Azure Virtual Machines II - LAB 00:01:00 Azure Virtual Machines III - LAB 00:02:00 Azure Virtual Machines IV - LAB 00:04:00 Azure Virtual Machines V - LAB 00:03:00 Azure Virtual Machines VI - LAB 00:03:00 What are Containers? 00:04:00 Containers ( LAB Activity ) 00:07:00 Containers VS Virtual Machines 00:04:00 What Are Virtual Networks 00:01:00 Virtual Networks - LAB 00:15:00 Azure Load Balancer 00:01:00 VPN Gateway 00:01:00 Azure Application Gateway - I 00:02:00 Azure Application Gateway - II 00:01:00 Azure Content Delivery Networks (CDN's) 00:02:00 How CDN works ? 00:03:00 Azure CDN - Lab Activity 00:07:00 Azure Storage Services 00:01:00 Structured Data 00:01:00 Semi Structured Data 00:01:00 Unstructured Data 00:01:00 Azure Storage Account - Types 00:03:00 Azure Storage Account - Blob - Lab Activity - I 00:07:00 Azure Storage Account - Blog - Lab Activity - II 00:07:00 Azure Storage Account - Blob - Lab Activity - III 00:16:00 Azure Storage Account - Blog - Lab Activity - IV 00:09:00 Azure Storage Account - Blob - Lab Activity - V 00:04:00 Azure Storage Account - Blob - Lab Activity - VI 00:07:00 Azure Database Services 00:02:00 Azure SQL - Lab Demo 00:09:00 Azure MarketPlace 00:02:00 What is Internet of Things ( IOT ) - Intro 00:01:00 IOT Hub 00:01:00 IOT Hub Demo 00:09:00 Azure Big Data and Analytics 00:01:00 Azure SQL Data Warehouse 00:01:00 Azure HDInsights 00:01:00 Azure Data Lake Analytics 00:01:00 Machine Learning 00:02:00 Azure Machine Learning Services and Studio 00:02:00 What is Server less Computing ? 00:02:00 The concept of DevOps 00:03:00 Azure Management Tools 00:01:00 Creating Resources with Powershell - Lab Activity 00:05:00 Creating Resources with Azure CLI - Lab Activity 00:07:00 Provision Resources using Cloud Shell - Lab Activity 00:05:00 Deployment with JSON - Lab Activity 00:08:00 Azure Advisor 00:01:00 Module 2 : What did we learn 00:01:00 Module 3 Security, Privacy, Compliance and Trust What to expect in Module 3 00:01:00 Azure Firewalls 00:02:00 Azure Firewall - Lab Activity - notes 00:02:00 Azure Firewall - Lab Activity 00:19:00 Azure DDOS 00:02:00 Network Security Groups 00:03:00 Application Security Groups 00:02:00 Which Network Security Solution to choose from ? 00:04:00 AuthZ and AuthN 00:01:00 Azure Active Directory 00:02:00 Multi Factor Authentication 00:03:00 Azure Security Center 00:02:00 Azure Security center - LAB activity 00:08:00 Azure Key Vault 00:02:00 Azure Information Protection 00:02:00 Azure Advanced Threat Protection 00:04:00 What is Azure Policy 00:03:00 Azure Policy - Lab Activity 00:06:00 Azure Role Based Access Control ( RBAC ) 00:02:00 Azure Role Based Access Control ( RBAC ) - Lab Activity 00:07:00 Azure Locks 00:01:00 Azure Locks - Lab Activity 00:02:00 Azure Blueprints 00:01:00 Subscription Governance 00:02:00 Azure Tags 00:03:00 Azure Monitoring 00:02:00 Azure Monitor- Lab Activity 00:03:00 Azure Service Health 00:01:00 Monitoring Applications and Services 00:04:00 Compliance Terms and Requirements 00:02:00 Microsoft Privacy Statement 00:01:00 Microsoft Trust Center 00:01:00 Service Trust Portal 00:01:00 Azure Government Services 00:02:00 Azure Germany Services 00:01:00 Azure China 21Vianet 00:02:00 Module 4 : Azure Pricing and Support Module 4 Introduction : What tÌ¥o expect in this module 00:02:00 Azure Subscriptions 00:06:00 What are Management Groups 00:01:00 Purchase Azure Product & Services : Available Options 00:01:00 Usage Metrics 00:01:00 Factors Affecting Costs 00:02:00 The concept of Zones for Billing 00:02:00 Azure Pricing Calculator 00:04:00 Azure Total Cost of Ownership ( TCO ) 00:02:00 Ways to Minimize Costs in Azure 00:04:00 Azure Cost Management 00:02:00 Azure Support Plans 00:03:00 Alternative Support Options 00:02:00 Service Level Agreements ( SLA's ) 00:03:00 Composite SLA's 00:03:00 Improving Application SLA's 00:04:00 Public and Preview Features 00:01:00 Providing Feedback 00:01:00 General Availability 00:01:00 Azure Updates , Announcements and Roadmaps 00:01:00 Course Conclusion Course Conclusion 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
This course focuses on Kali Linux and Nmap, which every network administrator needs to know. You will also learn the best practices to scan your networks for weaknesses and learn some excellent techniques to defend the security threats.
Overview This comprehensive course on CompTIA Network (N10-007) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Network (N10-007) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Network (N10-007). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Network (N10-007) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 172 lectures • 22:43:00 total length •Introduction: 00:03:00 •What is a Model?: 00:02:00 •OSI vs. TCP/IP Model: 00:07:00 •Walking Through OSI and TCP/IP: 00:12:00 •Meet the Frame: 00:06:00 •The MAC Address: 00:07:00 •Broadcast vs. Unicast: 00:04:00 •Introduction to IP Addressing: 00:08:00 •Packets and Ports: 00:05:00 •Network Topologies: 00:10:00 •Coaxial Cabling: 00:05:00 •Twisted Pair Cabling: 00:06:00 •Cat Ratings: 00:06:00 •Fiber Optic Cabling: 00:09:00 •Fire Ratings: 00:05:00 •Legacy Network Connections: 00:07:00 •What is Ethernet?: 00:07:00 •Ethernet Frames: 00:07:00 •Early Ethernet: 00:08:00 •The Daddy of Ethernet, 10BaseT: 00:03:00 •Terminating Twisted Pair: 00:14:00 •Hubs vs. Switches: 00:13:00 •100BaseT: 00:05:00 •Connecting Switches: 00:05:00 •Gigabit Ethernet and 10-Gigabit Ethernet: 00:05:00 •Transceivers: 00:07:00 •Connecting Ethernet Scenarios: 00:14:00 •Introduction to Structured Cabling: 00:04:00 •Terminating Structured Cabling: 00:08:00 •Equipment Room: 00:07:00 •Alternative Distribution Panels: 00:04:00 •Testing Cable: 00:09:00 •Troubleshooting Structured Cabling, Part 1: 00:05:00 •Troubleshooting Structured Cabling, Part 2: 00:05:00 •Using a Toner and Probe: 00:03:00 •Wired Connection Scenarios: 00:11:00 •Introduction to IP Addressing and Binary: 00:13:00 •Introduction to ARP: 00:04:00 •Classful Addressing: 00:10:00 •Subnet Masks: 00:12:00 •Subnetting with CIDR: 00:10:00 •More CIDR Subnetting Practice: 00:10:00 •Dynamic and Static IP Addressing: 00:18:00 •Rogue DHCP Servers: 00:07:00 •Special IP Addresses: 00:07:00 •IP Addressing Scenarios: 00:15:00 •Introducing Routers: 00:15:00 •Understanding Ports: 00:05:00 •Network Address Translation: 00:06:00 •Implementing NAT: 00:03:00 •Forwarding Ports: 00:18:00 •Tour of a SOHO Router: 00:12:00 •SOHO vs. Enterprise: 00:09:00 •Static Routes: 00:13:00 •Dynamic Routing: 00:11:00 •RIP: 00:04:00 •OSPF: 00:04:00 •BGP: 00:06:00 •TCP and UDP: 00:07:00 •ICMP and IGMP: 00:06:00 •Handy Tools: 00:07:00 •Introduction to Wireshark: 00:11:00 •Introduction to netstat: 00:09:00 •Web Servers: 00:12:00 •FTP: 00:12:00 •E-mail Servers and Clients: 00:09:00 •Securing E-mail: 00:06:00 •Telnet and SSH: 00:09:00 •Network Time Protocol: 00:02:00 •Network Service Scenarios: 00:10:00 •Understanding DNS: 00:12:00 •Applying DNS: 00:19:00 •The Hosts File: 00:04:00 •Net Command: 00:08:00 •Windows Name Resolution: 00:11:00 •Dynamic DNS: 00:05:00 •DNS Troubleshooting: 00:13:00 •Making TCP/IP Secure: 00:04:00 •Symmetric Encryption: 00:06:00 •Asymmetric Encryption: 00:03:00 •Cryptographic Hashes: 00:05:00 •Identification: 00:00:00 •Access Control: 00:04:00 •AAA: 00:05:00 •Kerberos/EAP: 00:00:00 •Single Sign-On: 00:10:00 •Certificates and Trust: 00:14:00 •Certificate Error Scenarios: 00:08:00 •Understanding IP Tunneling: 00:06:00 •Virtual Private Networks: 00:13:00 •Introduction to VLANs: 00:12:00 •InterVLAN Routing: 00:03:00 •Interfacing with Managed Switches: 00:11:00 •Switch Port Protection: 00:07:00 •Port Bonding: 00:07:00 •Port Mirroring: 00:04:00 •Quality of Service: 00:05:00 •IDS vs. IPS: 00:04:00 •Proxy Servers: 00:13:00 •Load Balancing: 00:09:00 •Device Placement Scenarios: 00:13:00 •Introduction to IPv6: 00:13:00 •IPv6 Addressing: 00:15:00 •IPv6 in Action: 00:13:00 •IPv4 and IPv6 Tunneling: 00:05:00 •Telephony Technologies: 00:09:00 •Optical Carriers: 00:03:00 •Packet Switching: 00:05:00 •Connecting with Dial-up: 00:05:00 •Digital Subscriber Line (DSL): 00:05:00 •Connecting with Cable Modems: 00:04:00 •Connecting with Satellites: 00:03:00 •ISDN and BPL: 00:04:00 •Remote Desktop Connectivity: 00:05:00 •Advanced Remote Control Systems: 00:09:00 •Introduction to 802.11: 00:12:00 •802.11 Standards: 00:12:00 •Power over Ethernet (PoE): 00:04:00 •Antennas: 00:09:00 •Wireless Security Standards: 00:16:00 •Implementing Wireless Security: 00:07:00 •Threats to Your Wireless Network: 00:07:00 •Retro Threats: 00:05:00 •Wi-Fi Protected Setup (WPS): 00:05:00 •Enterprise Wireless: 00:06:00 •Installing a Wireless Network: 00:15:00 •Wireless Scenarios: 00:07:00 •More Wireless Scenarios: 00:09:00 •Virtualization Basics: 00:07:00 •Cloud Ownership: 00:03:00 •Cloud Implementation: 00:12:00 •Your First Virtual Machine: 00:09:00 •NAS and SAN: 00:16:00 •Platform as a Service (PaaS): 00:09:00 •Software as a Service (SaaS): 00:03:00 •Infrastructure as a Service (IaaS): 00:10:00 •Cellular Technologies: 00:05:00 •Mobile Connectivity: 00:07:00 •Deploying Mobile Devices: 00:05:00 •Mobile Access Control: 00:06:00 •Network Types: 00:04:00 •Network Design: 00:10:00 •Power Management: 00:06:00 •Unified Communications: 00:11:00 •Network Documentation: 00:07:00 •Contingency Planning: 00:10:00 •Predicting Hardware Failure: 00:05:00 •Backups: 00:08:00 •What is Risk Management?: 00:06:00 •Security Policies: 00:08:00 •Change Management: 00:07:00 •User Training: 00:03:00 •Standard Business Documentation: 00:05:00 •Mitigating Network Threats: 00:05:00 •High Availability: 00:05:00 •Denial of Service: 00:09:00 •Malware: 00:10:00 •Social Engineering: 00:04:00 •Access Control: 00:08:00 •Man-in-the-Middle: 00:22:00 •Introduction to Firewalls: 00:05:00 •Firewalls: 00:10:00 •DMZ: 00:06:00 •Hardening Devices: 00:14:00 •Physical Security Controls: 00:09:00 •Testing Network Security: 00:08:00 •Network Protection Scenarios: 00:14:00 •SNMP: 00:15:00 •Documenting Logs: 00:09:00 •System Monitoring: 00:08:00 •SIEM (Security Information and Event Management): 00:07:00 •Network Troubleshooting Theory: 00:05:00
Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00