• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

220 VPN courses

WANs demystified

5.0(3)

By Systems & Network Training

WANs training course description A concise overview course covering Wide Area Networks with particular emphasis on the WAN options available including the use of the Internet. What will you learn Choose and evaluate WAN technologies. Recognise the role of service providers. Describe the benefits of VPNs. Describe how the Internet can be used as a WAN. Describe the equipment needed to connect LANS to WANS. List the speeds of various WAN technologies. WANs training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of WANS. Prerequisites: Network fundamentals Duration 1 day WANs training course contents WANS WAN architecture, Common WAN terms, Core vs access, service providers, relationship with 7 layer model, WAN equipment, how to choose a WAN. Layer 1 Copper, phone lines, fibre, coaxial, satellite, wireless. Cabling to the building, CPE cabling, interfaces. Layer 2 Dial up vs. Dedicated vs. packet switched networks and when to use them. Packet switching vs. circuit switching. Point to point and point to multipoint. Dialup access technologies Modems, ISDN, BRI, PRI. Access with dedicated lines XDSL, leased lines. WAN services X.25, SMDS, Frame Relay, CIR, ATM, Internet, MANS, dark fibre and other services. Case study: Selecting WAN technologies. Service provider technologies MPLS, SDH, WDM, DWDM. Routers Network addressing, default gateways, routing tables, routing protocols. Internet architecture Service providers, ISPs, private peering, public peering, core WANs in the Internet. VPNs Private networks, public networks, What are VPNs?, benefits of VPNs, tunnelling, encryption, IPSec. Case study: Specifying WAN connectivity.

WANs demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Cyber Incident Response for Business Professionals

By Mpi Learning - Professional Learning And Development Provider

This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT's NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.

Cyber Incident Response for Business Professionals
Delivered Online On Demand
£350

CompTIA Cloud+ Certification (CV0-002) Exam Prep Course

By Packt

Cloud+ is an intermediate-level Network Specialist certification. The median?annual salary for a Cloud+ certified techie is around $74k, and there are?currently over 50,000 job postings for Cloud+ specialists in the US.?This course will help you to get up and running with cloud computing fundamentals and prepare for the CV0-002 exam.

CompTIA Cloud+ Certification (CV0-002) Exam Prep Course
Delivered Online On Demand10 hours 36 minutes
£93.99

Certified Wireless Security Professional (CWSP)

4.8(9)

By Skill Up

Wireless security is essential for any organization, but it can be complex to implement and manage. The CWSP course will give you the skills and knowledge to secure your wireless network from various threats.

Certified Wireless Security Professional (CWSP)
Delivered Online On Demand13 hours 32 minutes
£25

IT Security for IT Professionals

4.3(43)

By John Academy

Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.

IT Security for IT Professionals
Delivered Online On Demand
£23.99

Certified Wireless Security Professional (CWSP) - Complete Video Course

4.3(43)

By John Academy

Description: CWSP is a professional level certification for network engineers who seek to establish their expertise in enterprise Wi-Fi security. Contrary to popular belief, enterprise Wi-Fi can be secure, if the IT pros installing and configuring it understand how to secure the wireless network. This Certified Wireless Security Professional (CWSP) - Complete Video Course covers the functions and features of Certified Wireless Security Professional. In this course, you will learn the basics of WLAN security, Legacy security, encryption ciphers and methods, 802.11 authentication methods. You will learn about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. You will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, and WLAN security infrastructure. You are welcome to join this course to learn more and improve your skills and knowledge. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Wireless Security Professional (CWSP) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Wireless Security Professional (CWSP) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. WLAN Security Overview WLAN Security Overview and Data Privacy 00:58:00 Networking Basics 00:04:00 Web GUI Introduction 00:05:00 Security Options 00:03:00 Legacy Security Legacy Security 00:32:00 VPNs 00:21:00 Security Association 00:09:00 MAC Spoofing 00:07:00 Encryption Ciphers and Methods Encryption Ciphers and Methods 00:19:00 TKIP 00:26:00 CCMP 00:20:00 Encryption Examples 00:06:00 802.11 Authentication Methods 802.11 Authentication Methods 00:26:00 802.1X 00:20:00 EAP 00:25:00 Certified Authority Server Credentials 00:06:00 Dynamic Encryption Key Generation Dynamic Encryption Key Generation 00:21:00 Authentication and Key Management 00:13:00 RSNA Key Hierarchy 00:12:00 EAP 00:05:00 Information Elements 00:06:00 SOHO 802.11 Security SOHO 802.11 Security 00:26:00 Wi-Fi Protected Setup (WPS) 00:20:00 Cracking Hashes 00:09:00 Fast Secure Roaming Fast Secure Roaming 00:24:00 PMKSA 00:29:00 FT Key Hierarchy (e-notes) 00:30:00 802.11K-2008 00:28:00 Wireless Security Risks Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless LAN Security Auditing Wireless LAN Security Auditing 00:28:00 Wireless Security Monitoring Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 VPNs, Remote Access and Guest Access Services VPNs, Remote Access and Guest Access Services 00:23:00 Remote Access 00:14:00 WLAN Security Infrastructure WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Wireless Security Policies Wireless Security Policies 00:17:00 Other Policies 00:14:00 Mock Exam Mock Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Wireless Security Professional (CWSP) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Wireless Security Professional (CWSP) - Complete Video Course
Delivered Online On Demand13 hours 31 minutes
£24

Certified Wireless Network Administrator and Security Professional - Complete Video Course

4.3(43)

By John Academy

Description: If you are working in company related to wireless technology, the course is the best solution for you. The course illustrates the fundamentals and essentials functions of wireless network technology and helps you to embrace the system efficiently. The course is sectioned into two parts - one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security Professional section. On the other hand, you gain a crystal clear knowledge about Wi-Fi access, MAC, WLAN, troubleshooting in the Network Administration part. The purpose of the bundled course is to help you to accustom with the troubleshooting process and network configuration process of Wireless technology. The course helps you to handle WLAN network securely. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Wireless Network Administrator (CWNA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Wireless Network Administrator (CWNA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Overview of Wireless Communications FREE 00:23:00 Communication Fundamentals 00:15:00 Fundamentals of RF Fundamentals of RF 00:07:00 Characteristics of RF 00:17:00 RF Behaviors 00:17:00 Components and Measurements of RF Components and Measurements of RF 00:19:00 dB Mathematics 00:18:00 Math Examples (eNotes) 00:20:00 Noise Floor 00:07:00 RF Signal and Antenna Concepts RF Signal and Antenna Concepts 00:13:00 Antenna Types 00:15:00 Beamforming 00:09:00 IEEE 802.11 IEEE 802.11 00:15:00 802.11i 00:10:00 Spread Spectrum Technologies Course Overview Direct Sequence Spread Spectrum (Part 1) 00:22:00 Direct Sequence Spread Spectrum (Part 2) 00:21:00 WLAN Topologies WLAN Topologies 00:10:00 Distribution Service 00:08:00 Mesh BSS 00:15:00 Wi-Fi Access Wi-Fi Access 00:14:00 Interframe Space (IFS) 00:13:00 MAC Architecture MAC Architecture 00:18:00 Beacon Frames 00:11:00 WLAN Architecture WLAN Architecture 00:17:00 WLAN Controller 00:11:00 WLAN Deployment WLAN Deployment 00:10:00 Network Extension to Remote Areas 00:13:00 Troubleshooting Troubleshooting 00:18:00 802.11 Coverage Considerations 00:17:00 Capacity vs. Coverage 00:19:00 Security Security 00:22:00 Robust Security 00:24:00 Types of Wireless Attacks Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Fundamentals of Site Surveys Fundamentals of Site Surveys 00:16:00 Site Survey Tools Site Survey Tools 00:05:00 Site Survey 00:15:00 PoE PoE 00:09:00 Midspan 00:08:00 High Throughput (HT) High Throughput (HT) 00:11:00 Spatial Multiplexing (SM) 00:12:00 Very High Throughput (HT) Very High Throughput (VHT) 00:18:00 BYOD BYOD 00:19:00 Over the Air Management 00:10:00 WLAN Security Overview WLAN Security Overview and Data Privacy 00:58:00 Networking Basics 00:04:00 Web GUI Introduction 00:05:00 Security Options 00:03:00 Legacy Security Legacy Security 00:32:00 VPNs 00:21:00 Security Association 00:09:00 MAC Spoofing 00:07:00 Encryption Ciphers and Methods Encryption Ciphers and Methods 00:19:00 TKIP 00:26:00 CCMP 00:20:00 Encryption Examples 00:06:00 802.11 Authentication Methods 802.11 Authentication Methods 00:26:00 802.1X 00:20:00 EAP 00:25:00 Certified Authority Server Credentials 00:06:00 Dynamic Encryption Key Generation Dynamic Encryption Key Generation 00:21:00 Authentication and Key Management 00:13:00 RSNA Key Hierarchy 00:12:00 EAP 00:05:00 Information Elements 00:06:00 SOHO 802.11 Security SOHO 802.11 Security 00:26:00 Cracking Hashes 00:09:00 Cracking Hashes 00:09:00 Fast Secure Roaming Fast Secure Roaming 00:24:00 PMKSA 00:29:00 FT Key Hierarchy (e-notes) 00:30:00 802.11K-2008 00:28:00 Wireless Security Risks Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless LAN Security Auditing Wireless LAN Security Auditing 00:28:00 Wireless Security Monitoring Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 VPNs, Remote Access and Guest Access Services VPNs, Remote Access and Guest Access Services 00:23:00 Remote Access 00:14:00 WLAN Security Infrastructure WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Wireless Security Policies Wireless Security Policies 00:17:00 Other Policies 00:14:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Wireless Network Administrator and Security Professional - Complete Video Course
Delivered Online On Demand23 hours 29 minutes
£24

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training

4.3(43)

By John Academy

Description The Implementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Internetwork Professional CCIP, and Cisco Certified Design Professional CCDP certifications. This Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training will help you to be certified Successfully with all the important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. This is an advanced course on Cisco routing configuration for both IPv4 and IPv6. In this course, you will gain the knowledge to configure and optimize a routing domain using OSPF, EIGRP, BGP, PBR, IP SLA and configure redistribution when needed. It also includes the configuration of highly secure routing solutions to support branch offices and mobile workers. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Routing Services Complex Enterprise Network Frameworks, Architectures, and Models FREE 00:15:00 Creating, Documenting, and Executing an Implementation Plan 00:09:00 Overview of IP Routing 00:12:00 RIPNG 00:26:00 Configuring the Enhanced Interior Gateway Routing Protocol Understanding EIGRP Terminology and Operation 00:14:00 Planning EIGRP Routing Implementations 00:03:00 Configuring and Verifying EIGRP 00:03:00 Enable EIGRP Routing 00:01:00 Define EIGRP Networks 00:03:00 Define Bandwidth on Interfaces 00:01:00 Enable and Disable EIGRP Automatic Summarization 00:01:00 Passive Interface 00:02:00 IP Default Network 00:03:00 Configure a Router to Advertise a Default Route as the Gateway 00:02:00 Example of the IP Route Next Hop Command 00:01:00 Example of the IP Route Quad Zero Command 00:01:00 Summarization in Discontiguous Networks 00:01:00 Configuring and Verifying EIGRP in an Enterprise WAN 00:03:00 Disabling Automatic Summarization 00:01:00 Frame Relay Using Dynamic Mapping 00:03:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 EIGRP over Layer 2 MPLS VPNs 00:04:00 Configuring and Verifying EIGRP Authentication 00:04:00 Configure Authentication Mode for EIGRP 00:02:00 Configure the Key Chain 00:01:00 Optimizing EIGRP Implementations 00:05:00 Enable Authentication to use the Key Chain 00:01:00 EIGRP 00:21:00 Configuring the Open Shortest Path First Protocol Understanding OSPF Terminology and Operation 00:20:00 OSPF Packets 00:11:00 Planning OSPF Routing Implementations 00:06:00 Basic OSPF Verification and Configuration 00:09:00 Configuring Single Area OSPF 00:02:00 Configuring Multi Area OSPF 00:01:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 OSPF Network Types 00:11:00 Assigning Router Priority 00:02:00 Override the Default Interface Cost 00:01:00 Configure a Key for Simple Authentication 00:01:00 Configure the MD5 Key-ID and Key 00:02:00 Verifying Simple Password Authentication 00:01:00 OSPF 00:19:00 Manipulating Routing Updates Assessing Network Routing Performance Issues 00:05:00 Using Multiple Routing Protocols on a Network 00:09:00 Redistribution Supports All Routing Protocols 00:01:00 Implementing Route Redistribution 00:07:00 Redistribute Routes into RIP 00:03:00 Redistribute Routes into OSPF 00:04:00 Default Metric for Routing Protocols 00:02:00 Redistributing Routes into EIGRP 00:05:00 Applying Metric Values for EIGRP 00:03:00 Modifying the Administrative Distance for all Routing Protocols 00:06:00 Changing OSPF AD 00:15:00 Controlling Routing Update Traffic 00:11:00 Route Map 00:10:00 Using Distribute Lists and Filter Incoming Routing Updates 00:03:00 Defining a Filter for Outgoing Routing Commands 00:02:00 Distribute List In or Out and Examples 00:06:00 Distribute Lists to Avoid Route Feedback 00:05:00 Fallbacks of Distribute Lists 00:01:00 Using Prefix Lists 00:02:00 Implementing Path Control Understanding Path Control 00:05:00 Similarities of ACLs and Prefix Lists 00:01:00 Implementing Path Control using Offset-Lists 00:02:00 Configuring a Prefix List 00:04:00 Implementing Path Control Using Offset-Lists 00:03:00 Verify Offset-Lists 00:01:00 Implementing Path Control using IOS IP SLAs 00:10:00 Cisco IOS IP SLAs 00:01:00 IP SLAs Applications 00:01:00 Operations - Responders and Sources 00:01:00 IP SLAs Operations 00:01:00 Steps to Deploying IP SLAs 00:01:00 IP SLA - ICMP ECHO and ICMP ECHO Sub Commands 00:04:00 IP SLA Schedules 00:05:00 Define Tracking Objects to Track the State of IP SLAs Operations 00:02:00 Configuring Track Delay 00:01:00 Configure a Static Route for IP SLAs Tracking 00:03:00 Verify IP SLAs using Method 1 00:02:00 Verify IP SLAs using Method 2 00:02:00 Implement Path Control using Policy-Based Routing 00:09:00 Implement Path Control using Policy-Based Routing 00:01:00 Configure PBR 00:01:00 Logical PBR Operation 00:01:00 Route-Map Commands for PBR 00:03:00 Match Statements and Conditions 00:03:00 Match Commands Used in PBR 00:01:00 Specify Criteria to be Matched using Prefix Lists of ACLs 00:01:00 Specify Criteria to be Matched by Packet Length 00:01:00 Modify Matching Conditions using Set Statements 00:01:00 Set Conditions 00:03:00 Set Commands used in PBR 00:02:00 Specify the Next Hop IP Address for Matching Packets 00:01:00 Specify Interfaces Through which Packets Can be Routed 00:01:00 Specify a List of Default Next-Hop IP Addresses 00:02:00 Specify a List of Default Interfaces 00:02:00 Mark Packets Using the IP ToS Field 00:02:00 Set the 3 IP Precedence Bits in the IP Packet Header 00:01:00 Set IP Precedence Parameters 00:02:00 Identify a Route Map to Use for Policy Routing on an Interface 00:01:00 Various Methods to Verify PBR 00:02:00 Advanced Path Control Tools 00:02:00 Implementing a Border Gateway Protocol Solution for ISP Connectivity BGP Terminology, Concepts, and Operation 00:20:00 EGP and IGP 00:01:00 AS 00:02:00 IANA 00:01:00 RIRs 00:02:00 AS Numbers 00:03:00 Facts about BGP 00:03:00 BGP Neighbors 00:03:00 BGP Operational Overview 00:02:00 BGP Use between ASs 00:01:00 BGP and IGPs 00:01:00 Connecting Enterprise Networks to Internet Service Providers 00:02:00 Configuring BGP 00:12:00 Questions for Deploying Routing and Connection 00:02:00 Public IP Address Space 00:02:00 Configure Static Routes 00:02:00 Configure the Default Local Preference 00:01:00 Define BGP as the IP Routing Protocol 00:03:00 Router BGP Command Parameters 00:01:00 Identify Peer Router to Establish a BGP Session 00:02:00 Create a Peer Group 00:02:00 Assign Neighbors as Part of the Peer Group 00:02:00 Disable an Existing BGP Neighbor or Peer Group Relationship 00:02:00 Establish the IBGP Session Using a Loopback Interface 00:02:00 IBGP Source IP 00:03:00 Increase the TTL for EBGP Connections 00:03:00 Configure the Router as the Next Hop for a BGP Speaking Peer 00:02:00 Verifying and Troubleshooting BGP 00:01:00 Basic BGP Path Manipulation Using Route Maps 00:05:00 Filtering BGP Routing Updates 00:02:00 Implementing Routing Facilities for Branch Offices and Mobile Workers Planning the Branch Office Implementations 00:15:00 NAT 00:09:00 Planning for Mobile Worker Implementations 00:03:00 Routing Traffic to the Mobile Worker 00:02:00 Implementing IPv6 in the Enterprise Network Introducing IPv6 00:07:00 Configuring and Verifying IPv6 Unicast Addresses 00:06:00 Routing IPv6 Traffic 00:01:00 Configuring Static Routing 00:04:00 Configuring OSPFv3 00:07:00 OSPFv3 00:22:00 Configuring EIGRP for IPv6 00:03:00 EIGRP for IPv6 00:18:00 Multiprotocol BGP (MP-BGP) 00:03:00 Mock Exam Mock Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training
Delivered Online On Demand10 hours 56 minutes
£24

Certified Information Systems Security Officer (CISSO) - Complete Video Course

4.3(43)

By John Academy

Description: The uniquely management-focused CISSO certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise's information security. CISSO means higher earning potential and career advancement. Recent independent studies consistently rank CISSO as one of the highest paying and sought after IT certifications. This Certified Information Systems Security Officer (CISSO) - Complete Video Course covers everything you need to know about becoming a Certified Information Systems Security Officer. In this course you will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security, and more. So, get this to demonstrate your information security management expertise and this course will enhance your competitive advantage. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Security Officer (CISSO) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Security Officer (CISSO) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Mock Exam Mock Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Security Officer (CISSO) - Complete Video Course
Delivered Online On Demand20 hours 55 minutes
£24

Cyber Security

4.7(160)

By Janets

Gain in-demand cybersecurity skills with our comprehensive online training program. Learn ethical hacking, network defense, digital forensics, and more from certified experts. Develop proficiency in the latest tools and technologies to protect systems and data from emerging cyber threats. Earn respected industry certifications.

Cyber Security
Delivered Online On Demand
£25