• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

380 Courses

Securing an Ubuntu Linux Server against Hackers Masterclass

4.5(3)

By Studyhub UK

Discover the vital techniques to fortify your Ubuntu Linux server against potential security threats and hackers with this comprehensive masterclass. Explore a step-by-step journey through essential security measures and configurations to safeguard your server. From password management and user privileges to SSH setup, firewall installation, and time synchronization, this course equips you with the skills needed to bolster your server's defenses. Gain insights into fail2ban installation, DDOS attack prevention, and system time synchronization. By mastering these techniques, you'll be prepared to maintain a robust and secure Ubuntu Linux server environment. Learning Outcomes: Understand the importance of securing an Ubuntu Linux server against hackers. Learn to choose a server host, access the server, and manage users. Implement SSH security measures including key-based logins and port change. Set up firewall protection with UFW to mitigate potential attacks. Configure time synchronization and system time accuracy using ntp. Explore the significance of fail2ban and its role in blocking IP addresses. Discover preventive measures against DDOS attacks through UFW. Gain practical insights into server maintenance and troubleshooting. Why buy this Securing an Ubuntu Linux Server against Hackers Masterclass?  Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Securing an Ubuntu Linux Server against Hackers Masterclass you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Securing an Ubuntu Linux Server against Hackers Masterclass course is ideal for System administrators and IT professionals responsible for server security. Linux enthusiasts seeking to enhance their Ubuntu server security skills. Individuals interested in learning practical techniques to secure their servers. Anyone aiming to improve their knowledge of Linux server security. Prerequisites This Securing an Ubuntu Linux Server against Hackers Masterclass was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Junior Linux Administrator - Average Earnings: £25,000 - £35,000 per year. Linux System Administrator - Average Earnings: £35,000 - £50,000 per year. Senior Linux Administrator - Average Earnings: £45,000 - £65,000 per year. IT Security Specialist - Average Earnings: £40,000 - £60,000 per year. DevOps Engineer - Average Earnings: £45,000 - £70,000 per year. Course Curriculum Secure an Ubuntu Linux Server against Hackers Module 01: Secure an Ubuntu Linux Server from Hackers Today 00:09:00 Module 02: Choosing a server host and setup 00:03:00 Module 03: Accessing the Ubuntu Linux server with putty 00:03:00 Module 04: How to download Putty for Windows 00:01:00 Module 05: Using a password manager like LastPass 00:03:00 Module 06: Changing the password with passwd 00:02:00 Module 07: Adding a new user with adduser 00:03:00 Module 08: Signing in with the added user 00:01:00 Module 09: Usermod to give the user sudo or root privileges 00:01:00 Module 10: Verify sudo access on user 00:01:00 Module 11: Key basic Linux commands cd pwd and ls 00:04:00 Module 12: Updating with apt get update 00:01:00 Module 13: Installing nano text editor 00:01:00 Module 14: Updating sshd config with nano to Permit Root Login no 00:09:00 Module 15: Changing the SSH port from 22 to another number 00:04:00 Module 16: Setting up RSA login by generating keys with puttygen 00:11:00 Module 17: Disabling password logins and ipv6 listening 00:02:00 Module 18: Locked out of server and have to start over! 00:02:00 Module 19: Back in with a fresh install! 00:02:00 Module 20: Installing fail2ban to block IPs from repeated failed logins 00:07:00 Module 21: Install UFW or Uniform Fire Wall to block some DDOS attacks 00:03:00 Module 22: Install and configure ntp to sync time 00:05:00 Module 23: Thank you very much for watching this complete Ubuntu Linux server 00:05:00 Module 24: Steem witness setup downloading blocks 00:03:00 Module 25: Steem witness setup finishing adding a new user 00:01:00 Module 26: Steem witness setup installing steem docker 00:04:00 Assignment Assignment - Securing an Ubuntu Linux Server against Hackers Masterclass 00:00:00

Securing an Ubuntu Linux Server against Hackers Masterclass
Delivered Online On Demand1 hour 31 minutes
£10.99

Bash Scripting, Linux and Shell Programming Masterclass

4.5(3)

By Studyhub UK

The Bash Scripting, Linux and Shell Programming Masterclass course is a comprehensive guide to mastering Bash scripting, Linux, and shell programming. It's designed to address a common challenge: the complexity of navigating and controlling Linux-based systems. By simplifying these concepts, the course empowers learners to manage and operate within a Linux environment efficiently. The ability to script and program in the shell opens doors to streamlined processes, automation, and enhanced productivity, benefits that are crucial in today's tech-driven world. Through this masterclass, you will learn the essentials of Linux navigation, file management, and shell programming. Each section is crafted to build your skills progressively, ensuring a deep understanding of each aspect. Whether managing users, handling text files, or exploring advanced Bash features, the course is structured to provide practical, real-world applications. This approach not only enhances your technical skills but also boosts your problem-solving abilities within a Linux context. By the end of this course, you will be proficient in the technical aspects of Linux and Bash scripting and gain a strategic edge in applying these skills. The course is designed for accessibility, allowing learners to study at their own pace, from any device. This flexibility ensures that you can integrate learning seamlessly into your schedule, making it ideal for both beginners and those looking to refresh their skills Learning Outcomes Gain proficiency in basic Bash scripting and shell programming. Learn to navigate efficiently within the Linux environment. Develop skills to access and use help resources in Linux. Acquire expertise in managing files and folders in Linux. Understand how to manipulate and process text files. Learn to manage user accounts and permissions in Linux. Master techniques for terminating programs and safe logouts. Discover efficient shortcuts for faster Linux operations. Deepen understanding of Bash specifics and advanced features. Access a wealth of resources for ongoing Linux learning. Why choose this Bash Scripting, Linux and Shell Programming Masterclass? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Bash Scripting, Linux and Shell Programming Masterclass for? Beginners eager to learn about Linux and shell programming. IT professionals seeking to enhance their scripting skills. System administrators aiming to improve their Linux proficiency. Developers interested in automating tasks with Bash scripting. Anyone curious about mastering Linux-based systems. Career path Linux System Administrator: £25,000 - £50,000. DevOps Engineer: £30,000 - £70,000. IT Support Specialist: £20,000 - £40,000. Software Developer (with Linux skills): £25,000 - £55,000. Network Engineer: £25,000 - £50,000 Prerequisites This Bash Scripting, Linux and Shell Programming Masterclass does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Bash Scripting, Linux and Shell Programming Masterclass was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 Bash vs Shell vs Command Line vs Terminal 00:06:00 Section 02: Navigation Listing Folder Contents (ls) 00:05:00 Print Current Folder (pwd) 00:01:00 Change Folder (cd) 00:03:00 Using A Stack To Push Folders (pushd/popd) 00:03:00 Check File Type (file) 00:01:00 Find File By Name (locate) & Update Locate Database (updatedb) 00:02:00 Find A Command (which) 00:02:00 Show Command History (history) 00:02:00 Section 03: Getting Help Show Manual Descriptions (whatis) 00:01:00 Search Manual (apropos) 00:02:00 Reference Manuals (man) 00:02:00 Section 04: Working With Files/Folders Creating A Folder (mkdir) 00:02:00 Creating A File (touch) 00:02:00 Copy Files/Folders (cp) 00:02:00 Move & Rename Files/Folders (mv) 00:02:00 Delete Files/Folders (rm) 00:02:00 Delete Empty Folder (rmdir) 00:02:00 Change File Permissions (chmod) 00:06:00 Section 05: Text Files File Concatenation (cat) 00:03:00 File Perusal Filter (more/less) 00:02:00 Terminal Based Text Editor (nano) 00:03:00 Section 06: Users Run Commands As A Superuser (sudo) 00:03:00 Change User (su) 00:03:00 Show Effecter User and Group IDs (id) 00:02:00 Section 07: Killing Programs & Logging Out Kill A Running Command (ctrl + c) 00:02:00 Kill All Processes By A Name (killall) 00:02:00 Logging Out Of Bash (exit) 00:01:00 Section 08: Shortcuts Tell Bash That There Is No More Input (ctrl + d) 00:02:00 Clear The Screen (ctr + l) 00:02:00 Zoom In (ctrl + +) 00:02:00 Zoom Out (ctrl + -) 00:02:00 Moving The Cursor 00:02:00 Deleting Text 00:04:00 Fixing Typos 00:03:00 Cutting and Pasting 00:03:00 Character Capitalisation 00:03:00 Section 09: Bash Bash File Structure 00:03:00 Echo Command 00:04:00 Comments 00:04:00 Variables 00:06:00 Strings 00:06:00 While Loop 00:04:00 For Loop 00:04:00 Until Loop 00:03:00 Break & Continue 00:03:00 Get User Input 00:02:00 If Statement 00:09:00 Case Statements 00:06:00 Get Arguments From The Command Line 00:04:00 Functions 00:05:00 Global vs Local Variables 00:03:00 Arrays 00:06:00 Shell & Environment Variables 00:06:00 Scheduled Automation 00:03:00 Aliases 00:03:00 Wildcards 00:03:00 Multiple Commands 00:02:00 Section 10: Resource Resource 00:00:00 Assignment Assignment - Bash Scripting; Linux and Shell Programming Masterclass 00:00:00

Bash Scripting, Linux and Shell Programming Masterclass
Delivered Online On Demand3 hours 3 minutes
£10.99

VMware vSphere Install Configure & Manage [v7]

4.5(3)

By Studyhub UK

Discover the power of virtualisation with our VMware vSphere Install, Configure & Manage [v7] online course. As an industry-standard platform, VMware vSphere 7 is integral for managing and optimising cloud infrastructure. Whether you're an IT professional seeking to expand your skills or a novice stepping into the world of virtualisation, this course will guide you through the complexities with ease.   Our comprehensive curriculum delves deep into the core aspects of VMware vSphere 7. From the initial installation of ESXi, the deployment of vCenter Server to mastering VMware Storage, this course ensures you're well-equipped to navigate the platform. You'll also learn about the upgrade to vSphere 7, back up VMs, secure a vSphere 7 deployment, and leverage vSphere 6.7's monitoring tools for optimal performance.   Crafted by experts and enriched with hands-on assignments, our course provides an interactive learning experience. Start your journey today and become a VMware vSphere 7 expert with us. Capitalise on the future of virtualisation - enrol now in the VMware vSphere Install, Configure & Manage [v7] course and drive your career forward! What will you learn in this course? Upon completion of the VMware vSphere Install Configure & Manage [v7] course, you should be able to: Gain a comprehensive understanding of the VMware vSphere 7 installation process. Develop skills to configure and manage the ESXi host and vCenter Server. Acquire expertise in setting up and managing VMware Virtual Switch and VMware Storage. Learn the ins and outs of vSphere 7 upgrade and vCenter features. Understand how to back up VMs and secure a vSphere 7 deployment effectively. Master troubleshooting techniques for a seamless vSphere 7 environment. Familiarise yourself with vSphere 6.7 monitoring tools for optimal system performance. Why buy this VMware vSphere course? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one-to-one assistance when needed Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript immediately Easily learn the skills and knowledge from the comfort of your home Who is this course for? This VMware vSphere Install Configure & Manage [v7] course is ideal for: IT professionals keen on upscaling their skills in virtualisation. Aspiring cloud engineers exploring the world of VMware. Enterprises looking to optimise their cloud infrastructure. Computer science students aiming for a career in virtualisation and cloud services. Certification After studying the course materials of the VMware vSphere Install Configure & Manage [v7] course, there will be a written assignment test which you can take either during or at the end of the course. After passing the test, you will have a range of certification options. A CPD Accredited PDF Certificate costs £4.99, while a CPD Accredited Hardcopy Certificate is £8.00. We also offer transcript services. A PDF Transcript costs £4.99, and a Hardcopy Transcript is £9.99. Select according to your needs, and we assure timely delivery of your chosen certificate. Requirements This expertly designed VMware vSphere Install Configure & Manage [v7] course does not require you to have any prior qualifications or experience. It is open to everyone, and you can access the course from anywhere at any time. Just enrol and start learning! Career Path Our VMware vSphere Install Configure & Manage [v7] course will help you to pursue a range of career paths, such as: Junior VMware Specialist: £35,000 - £45,000 per annum. VMware System Administrator: £50,000 - £60,000 per annum. Senior VMware Consultant: £65,000 - £75,000 per annum. VMware Solution Architect: £80,000 - £90,000 per annum. Head of Cloud Infrastructure: £95,000 - £110,000 per annum. Director of Cloud Services: £120,000 - £140,000 per annum.

VMware vSphere Install Configure & Manage [v7]
Delivered Online On Demand8 hours 15 minutes
£10.99

Learn How to Build a Computer Course from Scratch

4.5(3)

By Studyhub UK

Embarking on the journey of constructing a personal computer can be a transformative experience, blending the art of technology with practical ingenuity. 'Learn How to Build a Computer Course from Scratch' is your gateway to mastering this skill. This course isn't just about assembling parts; it's a holistic approach to understanding the intricacies of computer hardware and software.  Whether you're intrigued by the mechanics of PCs or aspiring to create an elite gaming system, this programme offers a comprehensive curriculum that guides you through each step of the process. From identifying the core components in Module 01 to the specialized focus on gaming systems in Module 07, every session is crafted to enhance your knowledge and confidence in building a computer. Learning Outcomes: Acquire the foundational knowledge of computer assembly, including selecting and handling various hardware components. Develop the ability to construct a high-performance gaming computer, incorporating advanced hardware suitable for demanding games. Gain proficiency in software installation and configuration, ensuring optimal performance and compatibility. Understand computer networking principles, enabling you to integrate your PC into various network environments effectively. Learn essential maintenance techniques to ensure the long-term reliability and performance of your custom-built computer. Why buy this Learn How to Build a Computer Course from Scratch? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Learn How to Build a Computer Course from Scratch there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Learn How to Build a Computer Course from Scratch for? Enthusiasts seeking to create their custom PC from scratch. Gamers looking to construct a high-performance gaming system. Individuals interested in learning about computer hardware and software. Hobbyists wanting to upgrade their technical skills in PC assembly. Career seekers aiming to develop skills in computer hardware maintenance and repair. Prerequisites This Learn How to Build a Computer Course from Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Learn How to Build a Computer Course from Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Computer Technician: £20,000 - £30,000 Per Annum Network Administrator: £25,000 - £40,000 Per Annum System Administrator: £30,000 - £50,000 Per Annum IT Support Specialist: £22,000 - £35,000 Per Annum Hardware Engineer: £28,000 - £50,000 Per Annum Gaming PC Builder: £18,000 - £35,000 Per Annum Course Curriculum Module 01: Introduction to Computer & Building PC Introduction to Computer & Building PC 00:17:00 Module 02: Overview of Hardware and Parts Overview of Hardware and Parts 00:27:00 Module 03: Building the Computer Building the Computer 00:25:00 Module 04: Input and Output Devices Input and Output Devices 00:22:00 Module 05: Software Installation Software Installation 00:35:00 Module 06: Computer Networking Computer Networking 00:21:00 Module 07: Building a Gaming PC Building a Gaming PC 00:19:00 Module 08: Maintenance of Computers Maintenance of Computers 00:20:00 Assignment Assignment - Learn How to Build a Computer Course from Scratch 00:00:00

Learn How to Build a Computer Course from Scratch
Delivered Online On Demand3 hours 6 minutes
£10.99

Cyber Security Incident Handling and Incident Response

4.5(3)

By Studyhub UK

Mastering the Digital Battlefield: Cyber Security Incident Handling and Incident Response Embark on a riveting journey into the heart of the digital battlefield with our course, 'Cyber Security Incident Handling and Incident Response.' In a world where the digital landscape is fraught with potential threats, mastering the art of incident response is your armor against cyber adversaries. This course is your compass through the intricate phases of incident handling, from meticulous preparation to the final thoughts that seal the breach. Each section is a chapter in your saga of becoming a digital guardian, equipping you with the skills to identify, contain, eradicate, and recover from cyber incidents. Unleash the hero within you as you navigate through real-world scenarios, honing your ability to respond swiftly and effectively to the ever-evolving challenges of the cyber realm. Enroll now to transform into a cyber sentinel, ready to face and conquer the dynamic landscape of digital threats. Learning Outcomes Gain a comprehensive understanding of incident handling principles, laying the foundation for a robust cyber defense strategy. Prepare effectively for potential cyber incidents, ensuring readiness to face and mitigate emerging threats. Develop the skills to identify and classify cyber incidents, discerning their nature and potential impact. Master the art of containment, eradicating threats effectively to prevent further damage. Acquire the knowledge and techniques necessary for a swift and successful recovery from cyber incidents, minimizing downtime and impact. Why choose this Cyber Security Incident Handling and Incident Response course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Cyber Security Incident Handling and Incident Response course for? IT professionals and cybersecurity enthusiasts looking to enhance their incident response skills. Cybersecurity analysts aiming to deepen their understanding of incident handling. System administrators and network security professionals seeking practical incident response knowledge. Individuals aspiring to pursue a career in cybersecurity or incident response roles. Small business owners and managers concerned about fortifying their digital infrastructure. Career path Incident Responder: £35,000 - £60,000 Cybersecurity Analyst: £30,000 - £55,000 Security Consultant: £40,000 - £70,000 Information Security Manager: £45,000 - £80,000 Chief Information Security Officer (CISO): £70,000 - £120,000 Digital Forensic Analyst: £35,000 - £65,000 Prerequisites This Cyber Security Incident Handling and Incident Response does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Cyber Security Incident Handling and Incident Response was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Cyber Security Incident Handling and Incident Response Promo 00:05:00 Section 01: An Introduction to Incident Handling 1.1 Incident Handling 00:07:00 Section 02: Preparation for an Incident 2.1 Preparation of People and Policy 00:07:00 2.2 Team Building and Management 00:06:00 Section 03: Identification 3.1 Where Does Identification Occur? 00:06:00 3.2 What to Check? 00:07:00 Section 04: Containment 4.1 Deployment and Categorisation 00:05:00 4.2 Short-term and Long-term Actions 00:05:00 Section 05: Eradication 5.1 Restoring and Improving Defenses 00:05:00 Section 06: Recovery Phase 6.1 Validation and Monitoring 00:06:00 Section 07: Final Thoughts 7.1 Meet, Fix, and Share 00:06:00 Resources Resources - Cyber Security Incident Handling and Incident Response 00:00:00 Assignment Assignment - Cyber Security Incident Handling and Incident Response 00:00:00

Cyber Security Incident Handling and Incident Response
Delivered Online On Demand1 hour 5 minutes
£10.99

Document Control Specialist Certification at QLS Level 3

4.5(3)

By Studyhub UK

In the digital era, an ocean of information exists at our fingertips. Amid this vast expanse, the ability to efficiently manage, control, and oversee documents is paramount. Enter the world of the 'Document Control Specialist Certification at QLS Level 3', a beacon guiding professionals to master the art and science of document management. This comprehensive course delves deep, unravelling the layers of document control, its principles, and its pivotal role in maintaining the integrity of information in various industries. By blending the traditional with the innovative, this course ensures a robust understanding, equipping you to spearhead document control initiatives confidently. Though seemingly simple, document control has multifaceted nuances requiring a strategic approach. The course covers the lifecycle of a document, introducing you to the different stages and processes it undergoes. Furthermore, it emphasises the importance of quality assurance, ensuring that every piece of information is up to the mark. In this digitised world, electronic systems play a significant role. Thus, a profound understanding of electronic document management systems is also imparted, facilitating a seamless transition between physical and digital realms. Enrol in this course and chart a rewarding journey. Dive deep into the realm of document control and emerge with both timeless and contemporary knowledge, an arsenal of skills that will set you apart in the professional domain. Learning Outcomes: Understand the fundamentals of document control and its role in various industries. Gain knowledge of document control principles and the elements of the document control environment. Learn about the document control lifecycle and the stages involved in managing documents effectively. Develop strategies and use instruments to maintain efficient document control processes. Acquire skills in document management and maintaining organized documentation systems. Understand the importance of quality assurance in controlling the quality of documents. Explore project document control techniques for effective project management. Familiarize yourself with electronic document management systems and soft copy documentation for modern document control practices. Why buy this Document Control Specialist Certification at QLS Level 3? Unlimited access to the course for a lifetime Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the course at your own pace and on your own schedule Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Document Control Specialist Certification at QLS Level 3 for? This course does not require you to have any prior qualifications or experience. You can just enrol and start learning. Career path Document Controller: Average UK salary of £30,000 - £40,000 Per Annum. Document Management Analyst: Average UK salary of £35,000 - £45,000 Per Annum. Quality Assurance Document Controller: Average UK salary of £32,000 - £42,000 Per Annum. Electronic Document Management System Administrator: Average UK salary of £38,000 - £48,000 Per Annum. Project Document Controller: Average UK salary of £40,000 - £50,000 Per Annum. Documentation Strategy Consultant: Average UK salary of £45,000 - £55,000 Per Annum. Prerequisites This Document Control Specialist Certification at QLS Level 3 does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Document Control Specialist Certification at QLS Level 3 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £85 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Module 1: Introduction to Document Control Introduction to Document Control 00:12:00 Module 2: Principles of Document Control and Elements of Document Control Environment Principles of Document Control and Elements of Document Control Environment 00:12:00 Module 3: Document Control Lifecycle Document Control Lifecycle 00:11:00 Module 4: Document Control Strategies and Instruments Document Control Strategies and Instruments 00:18:00 Module 5: Document Management Document Management 00:22:00 Module 6: Quality Assurance and Controlling Quality of Documents Quality Assurance and Controlling Quality of Documents 00:13:00 Module 7: Project Document Control Project Document Control 00:12:00 Module 8: Electronic Document Management Systems and Soft Copy Documentation Electronic Document Management Systems and Soft Copy Documentation 00:18:00 Assessment Assignment - Document Control Specialist Certification at QLS Level 3 02:00:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00

Document Control Specialist Certification at QLS Level 3
Delivered Online On Demand3 hours 58 minutes
£10.99

Penetration Testing with OWASP ZAP: Mastery course

4.5(3)

By Studyhub UK

Embark on a transformative journey into the world of cybersecurity with our comprehensive 'Penetration Testing with OWASP ZAP: Mastery Course.' This immersive programme delves into the intricacies of OWASP ZAP, a powerful tool that stands as the guardian against cyber threats. From mastering the fundamentals in the introductory phase to executing advanced scripting attacks, this course promises an engaging exploration of each facet, ensuring that you emerge not only skilled but also equipped to defend against evolving security challenges. In an era where digital landscapes are fraught with vulnerabilities, this course is your gateway to becoming a proficient cybersecurity professional, armed with the expertise to safeguard digital realms. Unlock the secrets of OWASP ZAP through a meticulously crafted curriculum. Delve into the configuration nuances, discover the art of automated attacks, and unravel the intricacies of security testing. With a mix of theoretical insights and hands-on applications, this course ensures a dynamic learning experience that goes beyond traditional boundaries. Join us on this odyssey, where every module propels you closer to mastering the art of penetration testing and fortifying applications against cyber threats. Learning Outcomes Installation and Configuration Mastery: Gain proficiency in installing OWASP ZAP across multiple platforms and delve into the intricacies of its configuration, marketplace, and add-ons. Attack Strategies: Develop automated attack skills within minutes, comprehend spidering, fuzzing, and active scanning techniques to fortify applications effectively. Scripting Prowess: Acquire the ability to script attacks using Zest Script, Python, and JavaScript, enhancing your toolkit for comprehensive security testing. Tool Integration Expertise: Explore the integration of Burp Suite into ZAP strategically, and learn to invoke various applications, amplifying your capabilities in diverse security scenarios. Report Generation and Analysis: Master the art of generating reports in multiple formats, a crucial skill for communicating findings and insights effectively. Why choose this Penetration Testing with OWASP ZAP: Mastery course course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Penetration Testing with OWASP ZAP: Mastery course course for? Cybersecurity Enthusiasts IT Professionals Seeking Advanced Security Skills Developers Interested in Application Security System Administrators Ethical Hackers Career path Cybersecurity Analyst: £30,000 - £50,000 Penetration Tester: £35,000 - £60,000 Security Consultant: £40,000 - £70,000 Security Engineer: £35,000 - £55,000 Application Security Analyst: £30,000 - £50,000 Information Security Manager: £50,000 - £80,000 Prerequisites This Penetration Testing with OWASP ZAP: Mastery course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Penetration Testing with OWASP ZAP: Mastery course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: Introduction Things to know about OWASP ZAP 00:24:00 Unit02: Configuration Of ZAP Installing ZAP on multi platform 00:19:00 Six elements of the ZAP - Desktop UI 00:12:00 ZAP marketplace and add-ons 00:09:00 Scan policy manager - config 00:25:00 Configuration of ZAP 00:32:00 ZAP attack modes 00:16:00 Unit 03: Attacking The Application With ZAP Automated attacks within 5 minutes 00:18:00 Spidering the target 00:24:00 Fuzzing the target in action 00:24:00 Active scanning the target 00:22:00 Break points and Requestor - Repeater 00:15:00 Authentication and session management 00:25:00 Forced browsing DIRs and Files using ZAP 00:12:00 Security testing in HUD mode - Heads-up display 00:17:00 ZAP Scripting attacks & Recording Zest Script, Python, JavaScript 00:24:00 Attack Surface Detector - SAST on ASP.NET MVC application 00:18:00 Security testing with ZAP API 00:15:00 Invoking applications into ZAP 00:17:00 Invoking Burp suite into ZAP - Best strategy 00:09:00 Other useful tools add-ons inside zap 00:29:00 Generating Reports in multiple formats 00:07:00 Additional Study Materials OWASP ZAP Course Guide 00:30:00 Assignment Assignment - Penetration Testing with OWASP ZAP 00:00:00

Penetration Testing with OWASP ZAP: Mastery course
Delivered Online On Demand7 hours 23 minutes
£10.99

Recruitment: IT Basics for IT Recruiters

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Recruitment: IT Basics for IT Recruiters Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Recruitment: IT Basics for IT Recruiters Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Recruitment: IT Basics for IT Recruiters Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Recruitment: IT Basics for IT Recruiters Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Recruitment: IT Basics for IT Recruiters? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Recruitment: IT Basics for IT Recruiters there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Recruitment: IT Basics for IT Recruiters course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Recruitment: IT Basics for IT Recruiters does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Recruitment: IT Basics for IT Recruiters was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Recruitment: IT Basics for IT Recruiters is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: Introduction Introduction 00:02:00 Section 02: IT Fundamentals Server 00:08:00 What is hardware and software? 00:04:00 Project Life Cycle 00:06:00 Software Development Life Cycle 00:08:00 Section 03: IT Terms / basics Methodologies: Scrum, Agile, Kanban, Waterfall, Lean 00:09:00 CMS 00:04:00 API 00:04:00 Stacks 00:03:00 Native & Hybrid Native Apps 00:02:00 CI / CD / Deployment tools 00:04:00 Section 04: IT Positions CTO 00:13:00 IT Architects 00:08:00 Product Owner 00:12:00 Product Manager 00:06:00 PO vs Product Manager 00:04:00 Project Manager 00:13:00 Product Owner vs Project Manager vs Product Manager 00:07:00 Business Analysts 00:09:00 Business Intelligence Analyst 00:06:00 Data Engineer 00:05:00 Data Scientist 00:07:00 Data Engineer vs Data Scientist 00:07:00 Agile Coach 00:14:00 Scrum Master 00:08:00 Agile Coach vs Scrum Master 00:01:00 Frontend Developer 00:06:00 Backend Developer 00:06:00 Fullstack Developer 00:04:00 Developers: Frontend, Backend and Fullstack 00:02:00 iOS Developer 00:03:00 Android Developer 00:04:00 UX Designers 00:09:00 UI Design 00:08:00 UX vs UI Design: what is the difference? 00:04:00 QA Engineers and Testers 00:09:00 System Administrators+ 00:07:00 DevOps 00:05:00 SEO Specialists: who are they? 00:10:00 Section 05: IT Technologies Programming languages and frameworks Programming Languages and Frameworks. Introduction 00:01:00 Programming languages and frameworks 00:08:00 JavaScript 00:02:00 Java 00:03:00 Python 00:01:00 C 00:02:00 C# 00:02:00 C++ 00:03:00 SWIFT 00:02:00 Objective C 00:01:00 HTML 00:02:00 PHP 00:02:00 Ruby 00:02:00 SQL 00:02:00 Go 00:01:00 R 00:01:00 Section 06: IT Technologies: Databases Database 00:05:00 Types of Databases 00:07:00 Section 07: From Recruiter to Recruiter The day of an IT Recruiter 00:05:00 Key principles 00:03:00 Sourcing Tipps 00:03:00 Section 08: Bye-bye Thank you for taking part in this course! 00:01:00 Assignment Assignment - Recruitment: IT Basics for IT Recruiters 00:00:00

Recruitment: IT Basics for IT Recruiters
Delivered Online On Demand5 hours 10 minutes
£10.99

CompTIA CySA+ Cybersecurity Analyst Course

4.5(3)

By Studyhub UK

Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00

CompTIA CySA+ Cybersecurity Analyst Course
Delivered Online On Demand11 hours 25 minutes
£10.99

IT Administration and Networking

4.5(3)

By Studyhub UK

Embark on a transformative journey into the digital realm with 'IT Administration and Networking', a meticulously structured course designed to elevate your digital competencies. This educational adventure commences with an exploration of fundamental IT literacy, establishing a solid foundation for the inquisitive mind. The curriculum advances, navigating through the complexities of software management and hardware understanding. As you traverse the terrain of cybersecurity, you'll become adept at safeguarding digital ecosystems against burgeoning threats. Concluding with a foray into the interconnected world of networking, the programme synthesises each element into a cohesive skill set that is indispensable in today's technologically driven landscape. Learning Outcomes Acquire foundational knowledge in IT concepts and operations. Gain insights into software configuration and troubleshooting. Understand hardware components and their interplay in computing systems. Master the principles of digital security and data protection. Grasp the essentials of constructing and managing network infrastructures. Why choose this IT Administration and Networking course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the IT Administration and Networking Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this IT Administration and Networking course for? Aspiring IT technicians poised to commence their vocational journey. Office administrators aiming to incorporate IT proficiency into their skillset. Entrepreneurs seeking to manage their business technology needs effectively. Students considering a career in information technology or related fields. Hobbyists interested in the technical aspects of computer systems. Career path IT Support Technician - £18,000 - £30,000 Network Administrator - £22,000 - £40,000 System Administrator - £25,000 - £50,000 Cybersecurity Analyst - £30,000 - £65,000 Network Engineer - £28,000 - £53,000 IT Manager - £30,000 - £70,000 Prerequisites This IT Administration and Networking does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Administration and Networking was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Tchniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Administration and Networking
Delivered Online On Demand3 days
£10.99