• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

14 TLS courses in Bradford delivered On Demand

SSL Complete Guide 2021: HTTP to HTTPS

By Packt

This course will teach you everything from scratch right from simple setups to complex solutions. If you want to master SSL and HTTPS in-depth, this course is for you! No prior knowledge of computer networks, encryption, or configuring web servers is required.

SSL Complete Guide 2021: HTTP to HTTPS
Delivered Online On Demand10 hours 54 minutes
£97.99

Real-World DevOps Project From Start to Finish

By Packt

Embark on a transformative DevOps journey! This comprehensive course equips you with skills in Ansible, Docker, GitLab, backups, and more. Master the art of self-hosting your infrastructure, streamlining deployments, and boosting efficiency. Launch your DevOps career today and unleash the endless possibilities!

Real-World DevOps Project From Start to Finish
Delivered Online On Demand5 hours 56 minutes
£48.99

Getting Started with HashiCorp Nomad

By Packt

Learn to operate Nomad to deploy and manage applications and services across multiple environments, including on-premises, cloud, and hybrid. Learn from the expert who will guide you through lectures, demonstrations, and real-world scenarios, giving you the skills and knowledge you need to succeed with Nomad HashiCorp skillsets.

Getting Started with HashiCorp Nomad
Delivered Online On Demand6 hours 22 minutes
£82.99

Cisco ASA Firewall Training with Step-by-Step Lab Workbook

4.8(9)

By Skill Up

Build shields with CISCO ASA Firewall skills and survive the cyberattacks. Learn Cisco ASA Firewall Basic Configuration Commands, Introduction to Routing & Static Routing.

Cisco ASA Firewall Training with Step-by-Step Lab Workbook
Delivered Online On Demand29 hours
£25

HashiCorp Certified - Consul Associate Course

By Packt

The course will provide a comprehensive overview of Consul and its capabilities, including deploying a single data center, registering services using service discovery, and accessing Consul Key/Value (KV). It is designed for individuals who possess basic terminal skills and have an understanding of application and data center/cloud networking architectures for running applications.

HashiCorp Certified - Consul Associate Course
Delivered Online On Demand8 hours 25 minutes
£82.99

AWS Tutorial: AWS Solutions Architect and SysOps Administrator

By Packt

This course covers the best practices required for AWS Solutions Architect and AWS SysOps Administrator. Explore real-time 3-tier architecture addressing security, high availability, scalability, and resource optimization. Basic knowledge of Linux and a desire to adopt cloud models are all you need to get started.

AWS Tutorial: AWS Solutions Architect and SysOps Administrator
Delivered Online On Demand12 hours 46 minutes
£33.99

Hands-on Linux - Self-Hosted WordPress for Linux Beginners

By Packt

Master the art of self-hosting WordPress on Linux with our comprehensive video course, designed to empower technical professionals to fully control their web presence.

Hands-on Linux - Self-Hosted WordPress for Linux Beginners
Delivered Online On Demand8 hours 32 minutes
£74.99

CISSP®️ Certification Domain 4 - Communication and Network Security Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP®? Certification Domain 4: Communication and Network Security. This course focuses on how our network and communications channels work and how to protect them. Domain 4 makes up 13% of the weighted exam questions.

CISSP®️ Certification Domain 4 - Communication and Network Security Video Boot Camp for 2022
Delivered Online On Demand5 hours
£74.99

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Cisco ASA Firewall Training

4.7(160)

By Janets

Register on the Cisco ASA Firewall Training today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cisco ASA Firewall Training is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cisco ASA Firewall Training Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cisco ASA Firewall Training, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Cisco ASA Firewall Training Lecture-1: Common Network Security Terms. 00:17:00 Lecture-2: Confidentiality, Integrity, Availability. 00:26:00 Lecture-3: Security Concepts & Terms. 00:38:00 Lecture-4: Introduction to Firewall Technologies. 00:28:00 Lecture-5: About Cisco ASA Firewall. 00:12:00 Lecture-6: Install Cisco ASAv Firewall in GNS3. 00:13:00 Lecture-6: Install Cisco ASAv Firewall in GNS3. 00:13:00 Lecture-8: Install Cisco ASAv Firewall on EVE-NG. 00:10:00 Lecture-9: Install Cisco ASAv Firewall on VMWare Workstation. 00:06:00 Lecture-10: Cisco ASA Firewall Basic Configuration Commands. 00:50:00 Lecture-11: Device Management Cisco ASA Console. 00:10:00 Lecture-12: Device Management Cisco ASA Telnet. 00:23:00 Lecture-13: Device Management Cisco ASA SSH. 00:21:00 Lecture-14: Device Management Cisco ASA ASDM. 00:32:00 Lecture-15: Device Management Cisco ASA TFTP. 00:21:00 Lecture-16: Device Management Cisco ASA FTP. 00:11:00 Lecture-17: Security Levels and Zoning in Cisco ASA. 00:40:00 Lecture-18: Introduction to Routing & Static Routing. 00:34:00 Lecture-19: Network Route Configuration in Cisco ASA. 00:09:00 Lecture-20: Host Route Configuration in Cisco ASA. 00:10:00 Lecture-21: Default Route Configuration in Cisco ASA. 00:26:00 Lecture-22: Floating Static Route Configuration in ASA. 00:37:00 Lecture-23: IP SLA (Service Level Agreement) in ASA. 00:29:00 Lecture-24: Dynamic Routing Protocol RIP version 2. 00:28:00 Lecture-25: Dynamic Routing Protocol EIGRP Configuration. 00:15:00 Lecture-26: Dynamic Routing Protocol OSPF Configuration. 00:38:00 Lecture-27: Routing Protocols Redistribution. 00:25:00 Lecture-28: Implement Access Control Lists in ASA. 00:36:00 Lecture-29: Configure & Verify Extended ACLs in ASA. 01:23:00 Lecture-30: Configure & Verify Infrastructure ACLs. 00:18:00 Lecture-31: Configure & Verify Time-Based ACLs. 00:22:00 Lecture-32: Configure & Verify Standard ACLs. 00:33:00 Lecture-33: Configure & Verify Object Groups ACLs. 00:42:00 Lecture-34: Configure & Verify DHCP Server in ASA. 00:42:00 Lecture-35: Configure & Verify DHCP Relay in ASA. 00:16:00 Lecture-36: Introduction & Theory of NAT and PAT ASA. 00:23:00 Lecture-37: Creating Lab Topology for NAT & PAT. 00:25:00 Lecture-38: Static NAT in Cisco ASA. 00:35:00 Lecture-39: Static PAT in Cisco ASA. 00:25:00 Lecture-40: Dynamic NAT in Cisco ASA. 00:26:00 Lecture-41: Dynamic PAT in Cisco ASA. 00:16:00 Lecture-42: Identity NAT in Cisco ASA. 00:23:00 Lecture-43: Policy NAT in Cisco ASA. 00:16:00 Lecture-44: Modular Policy Framework (MPF). 01:02:00 Lecture-45: Transparent Firewall. 00:34:00 Lecture-46: ASDM Walk-through. 01:17:00 Lecture-47: Security Contexts (Multi-Contexts). 00:50:00 Lecture-48: Redundancy, HA, Active/Standby Failover. 00:58:00 Lecture-49: Packet Capture in Cisco ASA Firewall. 00:44:00 Lecture-50: Packet Tracer in Cisco ASA Firewall. 00:18:00 Lecture-51: Syslog Logging in Cisco ASA Firewall. 00:45:00 Lecture-52: Introduction and Concept of Cryptography & Terminologies. 00:25:00 Lecture-53: Introduction & Concept of Symmetric & Asymmetric Encryption. 00:05:00 Lecture-54: Introduction and Concept of Cryptography Hash (SHA, MD5). 00:04:00 Lecture-55: Introduction and Concept of Virtual Private Network VPN. 00:46:00 Lecture-56: Introduction and Concept of IPSec Protocols Features. 00:43:00 Lecture-57: Introduction and Concept of Diffie-Hellman (DH). 00:51:00 Lecture-58: Introduction and Concept of SSL/TLS and Handshake. 00:34:00 Lecture-59: Introduction and Concept of IKE, Versions & Modes. 00:21:00 Lecture-60: Internet Key Exchange IKE Phase 1 two Modes Lab. 00:12:00 Lecture-61: Configure and Verify NAT-T (Traversal) on Routers. 00:26:00 Lecture-62: Configure and Verify Client-Based Remote-Access VPN Lab. 00:28:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Cisco ASA Firewall Training
Delivered Online On Demand29 hours
£25

Educators matching "TLS"

Show all 2