Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management
This is an intensive installation, commissioning, and maintenance course for emergency lighting systems. It is a follow on from our Foundation course on emergency lighting where the requirements of installation, commissioning, and maintenance are considered.
A two day knife making course is a great way to make yourself an item that will last a lifetime, on this two day course we forge a larger knife with a wooden handle, most students choose to do a kitchen knife but more elaborate bushcraft knives and athames have also been made. A knife is one of the oldest tools ever made by humanity and it is one that invokes many emotions to people when they see and use it for a productive task. When doing a knife making course here at Bearded Pig Forge we will discuss the fine details of a knife and how they are made as well as the history of forging them. On the course you will learn the basics of forging a blade and how to effectively heat treat them in order to get the most use out of the blades as well as techniques for sharpening and honing blades. Courses are £300 Per person per two days. All courses must be paid for a minimum of 14 days in advance to secure the date. I run a strict cancellation policy. If you cannot attend the date you have booked please contact me within three weeks and I will rebook your course for free, If you contact me after this deadline you will lose your place. Refunds are not available. No under 18s If you have a physical gift voucher it must be presented on the first day of a course. *Gift vouchers are valid for one year from date of purchase
Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.
Deep Tissue Massage Routine Our 2 day Intensive Deep Tissue Massage course is ideal if you have already studied body massage and wish to progress your understanding of therapeutic treatment. You will learn the skills required to apply preventative and post-event treatment that encourages the health of both muscles and connective tissue, help improve the range of your client’s movement as well as the tone, symmetry, balance of muscle and quality of posture. A firmer, stronger version of our Swedish Massage.
Gain expertise in hydrogen storage, transportation, and distribution with Energyedge's course. Successfully navigate the hydrogen value chain. Enroll now!
Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.
Develop essential negotiation skills with EnergyEdge's course tailored for engineers and technical professionals. Enroll in our classroom training now!
Overview Competitor Analysis is a key area every professional does to understand their business presence. It gives your insight into your business standings and also knowledge of your competitors and their strength and weakness. Analysing your competitors helps you understand the market and your power to deal with the competitors. It is an essential marketing and strategic tool. It provides both an offensive and defensive strategic tool to analyse opportunities and threats.