• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

955 Courses

Cybersecurity: Data Protection and Privacy

4.8(9)

By Skill Up

Become a cybersecurity data protection and privacy professional and learn how to protect your organisation's most sensitive data. This course covers the latest threats, vulnerabilities, and best practices.

Cybersecurity: Data Protection and Privacy
Delivered Online On Demand1 hour 2 minutes
£25

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity, Ethical Hacking, and Cloud Computing

By NextGen Learning

In today's digital landscape, ensuring the security and integrity of information has become more critical than ever. From understanding cyber threats to launching successful attacks and securing data in the cloud, our theoretical bundle on Cybersecurity, Ethical Hacking, and Cloud Computing provides a solid foundation. In this domain, professionals can expect rewarding careers and annual earnings ranging from £35K to £65K on average. Our dynamic bundle consists of three courses: Cyber Security Awareness Training, Learn Ethical Hacking From A-Z: Beginner To Expert, and Cloud Computing/CompTIA Cloud+ (CV0-002). This bundle is designed to equip individuals with the knowledge and expertise needed to navigate the complex world of cybersecurity, master the art of ethical hacking, and harness the power of cloud computing. The comprehensive modules offer theoretical knowledge and techniques to equip you with the competency to tackle the complex challenges of the digital era. Each course in this Cybersecurity, Ethical Hacking, and Cloud Computing bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This Cybersecurity, Ethical Hacking, and Cloud Computing bundle promises education and an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Immerse yourself in these diverse, enthralling subjects, each designed to fuel your curiosity and enhance your knowledge. Dive in now! The courses in this bundle include: Course 01: Cyber Security Awareness Training Course 02: Learn Ethical Hacking From A-Z: Beginner To Expert Course 03: Cloud Computing / CompTIA Cloud+ (CV0-002) Learning Outcomes: Develop a comprehensive understanding of cybersecurity principles, including recognising various cyber threats, attacks, and the importance of data breach prevention. Acquire extensive knowledge and techniques for ethical hacking, from networking basics to launching effective attacks and post-exploitation strategies. Gain insights into cloud computing technologies, including cloud storage, computing, networking, and security measures. Learn how to implement preventative measures to secure office and remote work environments, manage passwords effectively, and browse the internet safely. Understand the fundamentals of cloud deployment, including system requirements, migration, maintenance, and troubleshooting. Explore career pathways in the cybersecurity industry and gain valuable insights on starting a career in this field. The Cyber Security Awareness Training course sets the foundation, providing an in-depth understanding of cybersecurity essentials. Dive into the world of cyber-attacks, crimes, and data breaches, and learn preventative measures to protect sensitive information. Explore password management, secure browsing practices, and best practices for securing office and remote work environments. Next, the Learn Ethical Hacking From A-Z: Beginner To Expert course takes you on an exhilarating exploration of the ethical hacking landscape. From networking basics to mastering tools and techniques, you'll discover the art of launching successful attacks and safeguarding digital assets. Explore web application hacking, wireless network penetration, and post-exploitation strategies. Additionally, gain insights into how to establish a thriving career in the field of cybersecurity. Finally, the Cloud Computing/CompTIA Cloud+ (CV0-002) course introduces you to the transformative power of cloud technology. Unveil the world of cloud storage, computing, networking, and security, and learn to harness its potential. Understand the requirements for cloud deployments, migration strategies, and how to maintain and troubleshoot cloud solutions effectively. Immerse yourself in a cutting-edge journey through the realms of Cybersecurity, Ethical Hacking, and Cloud Computing with our engaging bundle of courses. Enrol today and unlock boundless opportunities in the world of technology! CPD 20 CPD hours / points Accredited by CPD Quality Standards Who is this course for? IT professionals looking to expand their knowledge and skills in cybersecurity, ethical hacking, and cloud computing. Individuals interested in pursuing a career in cybersecurity and seeking a solid theoretical foundation in the field. Business owners and managers who want to understand the fundamentals of cybersecurity and cloud computing to secure their digital infrastructure. IT enthusiasts passionate about exploring the realms of ethical hacking and gaining insights into the latest techniques and tools. Professionals in related fields, such as network administration or system administration, who want to broaden their expertise in cybersecurity and cloud computing. Career path Cybersecurity Analyst: £30,000 to £55,000 per year Ethical Hacker/Penetration Tester: £35,000 to £70,000 per year Cloud Security Specialist: £45,000 to £80,000 per year Security Consultant: £45,000 to £80,000 per year Network Security Engineer: £40,000 to £70,000 per year IT Auditor: £35,000 to £60,000 per year Cloud Architect: £55,000 to £80,000 per year Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - £9.99 Unlock your potential and showcase your accomplishments with our CPD Quality Standards certificates! Upon successful completion of the course, learners can obtain a CPD Quality Standards PDF certificate for Cyber Security Awareness Training absolutely free! Upon finishing Learn Ethical Hacking From A-Z: Beginner To Expert and Cloud Computing / CompTIA Cloud+ (CV0-002), you'll have the opportunity to obtain valuable proof of your achievement. For just £4.99, we'll send you a CPD Quality Standards PDF Certificate via email, or if you prefer, you can get a beautifully printed hardcopy certificate for £9.99 in the UK. If you're located internationally, don't worry! We offer a printed hardcopy certificate for £14.99, ensuring your success knows no boundaries. Grab your certificate and celebrate your success today!

Cybersecurity, Ethical Hacking, and Cloud Computing
Delivered Online On Demand26 hours
£21

ISO 27032: 2023 Lead Cybersecurity Manager

By Training Centre

  ISO/IEC 27032: 2023 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO 27032: 2023 and the NIST Cybersecurity framework. About This Course   During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders' role in Cybersecurity.    After mastering all the necessary concepts of Cybersecurity, you can sit for the exam and gain "Certified ISO/IEC 27032 Lead Cybersecurity Manager' Certification. By holding this certification, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Cybersecurity.   Learning objectives   Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity   Educational approach   This training is based on both theory and best practices used in the implementation and management of a Cybersecurity Program Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practical tests are similar to the Certification Exam Prerequisites   A fundamental understanding of ISO/IEC 27032: 2023 and comprehensive knowledge of Cybersecurity. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend?   Cybersecurity professionals Information Security experts Professionals seeking to manage a Cybersecurity program Individuals responsible to develop a Cybersecurity program IT specialists Information Technology expert advisors IT professionals looking to enhance their technical skills and knowledge Accreditation Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27032: 2023 Lead Cybersecurity Manager
Delivered OnlineFlexible Dates
£1,450

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues Lesson 10: Configuring Windows Topic 10A: Configure Windows User Settings Topic 10B: Configure Windows System Settings Lesson 11: Managing Windows Topic 11A: Use Management Consoles Topic 11B: Use Performance and Troubleshooting Tools Topic 11C: Use Command-line Tools Lesson 12: Identifying OS Types and Features Topic 12A: Explain OS Types Topic 12B: Compare Windows Editions Lesson 13: Supporting Windows Topic 13A: Perform OS Installations and Upgrades Topic 13B: Install and Configure Applications Topic 13C: Troubleshoot Windows OS Problems Lesson 14: Managing Windows Networking Topic 14A: Manage Windows Networking Topic 14B: Troubleshoot Windows Networking Topic 14C: Configure Windows Security Settings Topic 14D: Manage Windows Shares Lesson 15: Managing Linux and macOS Topic 15A: Identify Features of Linux Topic 15B: Identify Features of macOS Lesson 16: Configuring SOHO Network Security Topic 16A: Explain Attacks, Threats, and Vulnerabilities Topic 16B: Compare Wireless Security Protocols Topic 16C: Configure SOHO Router Security Topic 16D: Summarize Security Measures Lesson 17: Managing Security Settings Topic 17A: Configure Workstation Security Topic 17B: Configure Browser Security Topic 17C: Troubleshoot Workstation Security Issues Lesson 18: Supporting Mobile Software Topic 18A: Configure Mobile OS Security Topic 18B: Troubleshoot Mobile OS and App Software Topic 18C: Troubleshoot Mobile OS and App Security Lesson 19: Using Support and Scripting Tools Topic 19A: Use Remote Access Technologies Topic 19B: Implement Backup and Recovery Topic 19C: Explain Data Handling Best Practices Topic 19D: Identify Basics of Scripting Lesson 20: Implementing Operational Procedures Topic 20A: Implement Best Practice Documentation Topic 20B: Use Proper Communication Techniques Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered Online + more
£2,475

CyberSecurity Law Online Course

4.7(160)

By Janets

Register on the CyberSecurity Law Online Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CyberSecurity Law Online Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CyberSecurity Law Online Course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CyberSecurity Law Online Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Introduction to Cyber Law Introduction to Cyber Law 00:05:00 Module 02: Cyber Law, Cyber Ethics and Online Gambling Cyber Law Cyber Ethics and Online Gambling 00:05:00 Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Cyber Security and Trust in Cyberspace 00:10:00 Module 04: Threat Factors: Computer as a Target Threat Factors Computer as a Target 00:10:00 Module 05: Threats to Cyber Security by Criminals and Organised Crimes Threats to Cyber Security by Criminals and Organised Crimes 00:05:00 Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Threats to Cybersecurity by Hacktivists and Nation-States 00:15:00 Module 07: Cyberterrorism Cyberterrorism 00:10:00 Module 08: An Evolving Threat: The Deep Web An Evolving Threat The Deep Web 00:10:00 Module 9: Fraud Fraud 00:10:00 Module 10: Jurisdiction Jurisdiction 00:05:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

CyberSecurity Law Online Course
Delivered Online On Demand1 hour 25 minutes
£25

Cybersecurity: Fundamentals

5.0(9)

By Chart Learning Solutions

Cybersecurity involves safeguarding the networks and devices you use to protect your data from online criminals. At the most basic level, this can be locking your phone with facial recognition or using a strong password for your private Wi-Fi connection. So, why should you care about cybersecurity? Whether you access sensitive data daily through company networks or simply use your phone to surf the web, any online activity can provide avulnerabilityfor criminals to exploite, a loophole they can enter through to access personal information. Learning Objectives The following are some of the key outcomes in this course: Understand the types of cybercrime you're likely to encounter. Learn how to weigh the risks of using public Wi-Fi and how to prepare for a safe connection. Understand safe social media practices to stay connected with your social network. Understand the benefits and risks of social media platforms and the impact on your professional reputation. Target Audience Young Professionals

Cybersecurity: Fundamentals
Delivered Online On Demand18 minutes
£34.95

Security Threat Management (STM) Diploma: Advanced Cybersecurity & Threat Management

4.8(9)

By Skill Up

Flash Sale! CPD Certified | 20-in-1 Premium Bundle | Free PDF & Transcript Certificate | Lifetime Access

Security Threat Management (STM) Diploma: Advanced Cybersecurity & Threat Management
Delivered Online On Demand3 days
£100

Cybersecurity: An Introduction to Cybersecurity

5.0(1)

By Enspark

Delve into cybersecurity beyond tools: understand employee roles, cybercrime motivations, and the evolving threat landscape. Learn to guard against breaches with awareness.

Cybersecurity: An Introduction to Cybersecurity
Delivered Online On Demand10 minutes
£5.95

Ransomware Uncovered: Cybersecurity Threats & Solutions

4.3(43)

By John Academy

Explore the intricate world of cyber threats with our course, 'Ransomware Uncovered: Cybersecurity Threats & Solutions.' Gain insights into the evolving threat landscape, the underground economy of cybercriminals, and the cyber kill chain. Understand the mechanics of ransomware, delivery channels, and the psychological tactics employed by criminals. Learn to make informed decisions on whether to pay ransoms. Develop robust defense strategies and incident response plans. Empower yourself in the fight against cyber threats. Enroll now for a comprehensive journey into ransomware defense and cybersecurity resilience.

Ransomware Uncovered: Cybersecurity Threats & Solutions
Delivered Online On Demand2 hours
£23.99