• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

211 Courses

IT Support Technician Training

4.9(27)

By Apex Learning

Explore our comprehensive IT Support Technician Training Course with 64 modules covering computer basics, hardware, operating systems, troubleshooting, databases, programming, and more. Perfect for beginners and professionals alike.

IT Support Technician Training
Delivered Online On Demand5 hours
£12

Windows Server 2016 Complete Video Training

4.3(43)

By John Academy

Description: Windows Server 2016 is a server operating system that is designed to handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions more efficiently. Developed by Microsoft, it is a part of the Windows NT family of operating systems. With the proper knowledge of Windows Server 2016, you can able to handle your office environment proficiently. The Windows Server 2016 Complete Video Training course is for you if you want to master the features and functions of Windows Server 2016. Apart from this, the bundled video course will help you to prepare for the various exam of Microsoft Windows Server 2016 MCSA certification. The course is divided into four sections where each section helps you with a specific exam and the practical use of Windows Server. The 70-740 Exam section teaches you the methods of installing Windows Server in Host and Compute Environments along with the other features such as storage. On the other hand, the 70-741 series teaches you how to do networking with Windows server including implementing Domain Name system, etc. Next, you will learn about the functionality of Windows Server in the 70-742 section that focuses on the Web Application proxy implementations, Microsoft Azure AD and Directory Synchronization, etc. Finally, in the 70-744 part, you will know how to secure your Windows server. In short, the Windows Server 2016 Complete Video Training course helps you to understand all the necessary information skills if you want to use Windows Server 2016. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Windows Server 2016 Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Windows Server 2016 Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installing Windows Servers in Host and Computer Environments Determining Windows Server 2016 Installation FREE 00:54:00 Installing Windows Server 2016 Core and Nano Editions 01:35:00 Managing Windows Installations with Windows PowerShell 00:01:00 Create, Manage, and Maintain Windows Images to Deploy 00:33:00 Implementing Local and Enterprise Storage Solutions Managing Disks and Volumes in Windows Server 2016 01:00:00 Implementing and Managing Storage Spaces 00:45:00 Configuring Data Deduplication 00:39:00 Understanding Various Types of Storage 00:15:00 Fibre Channel, iSCSI, and Fibre Channel over Ethernet 00:18:00 Understanding iSNS, DCB, and MPIO 00:09:00 Configuring File and Folder Sharing in Windows Server 2016 00:21:00 Implementing Hyper-V Virtualization Installing Hyper-V Virtualization 00:26:00 Configuring Storage and Networking on Hyper-V Hosts 00:38:00 Configuring and Managing Virtual Machines 00:34:00 Implementing Windows Containers Understanding Windows Server and Hyper-V Containers 00:17:00 Deploying Windows Server and Hyper-V Containers 00:08:00 Using Docker to Install, Configure, and Manage Containers 00:12:00 Implementing High Availability Overview of High Availability and Disaster Recovery 00:55:00 Implementing Network Load Balancing 00:25:00 Planning and Configuring Failover Clustering 01:10:00 Maintaining a Failover Cluster 00:15:00 Troubleshooting Failover Clustering 00:11:00 Integrating Failover Clustering and Hyper-V 00:23:00 Configuring Site Availability 00:12:00 Maintaining and Monitoring Server Environments Windows Server Update Services 00:33:00 Windows PowerShell Desired State Configuration (DSC) 00:10:00 Windows Server 2016 Monitoring Tools 00:43:00 Plan and Implement IPv4 and IPv6 Networks Plan and Implement IP Addressing Schemes for IPv4 Networks FREE 01:31:00 Configuring IPv4 Hosts 00:18:00 Managing and Troubleshooting IPv4 Connectivity 00:35:00 Implementing IPv6 for Network Hosts 00:20:00 Implementing IPv6 Transitioning and Coexistence 00:16:00 Installing and Configuring DHCP Overview of the DHCP Server Role 00:16:00 Managing and Troubleshooting DHCP 00:48:00 Installing and Configuring DNS Implementing DNS Servers 00:27:00 Creating and Configuring DNS Zones 00:52:00 Understanding Active Directory Integration 00:23:00 Configuring Advanced DNS Settings 00:41:00 Implementing and Managing IP Address Management Overview of IPAM 00:15:00 IPAM Deployment 00:49:00 Implementing Remote Access Remote Access Overview 00:27:00 Implementing the Web Application Proxy 00:08:00 Planning and Implementing VPNs 00:31:00 Overview of DirectAccess 00:21:00 Implementing DirectAccess 00:27:00 Installing and Configuring Branch Office Networking Configuring Networking for Branch Offices 00:39:00 Implementing Distributed File Systems 00:44:00 Implementing BranchCache 00:19:00 Implementing Advanced Networking Features Implementing Networking Features for High Performance 00:23:00 Implementing Hyper-V Advanced Networking Features 00:13:00 Introduction to Software-Defined Networking 00:10:00 Overview of Network Virtualization 00:06:00 Installing and Configuring Domain Controllers Overview of Active Directory Domain Services FREE 01:00:00 Overview of Domain Controllers 00:30:00 Deploying Domain Controllers 1 01:00:00 Managing Active Directory Objects Overview of AD DS Object Management 00:23:00 Managing User Accounts 01:07:00 Managing Groups 01:06:00 Managing Computer Accounts 00:20:00 Managing Organizational Units 00:41:00 Securing Active Directory Domain Services Securing Domain Controllers 00:33:00 Implementing Account Security 00:48:00 Auditing AD DS 00:26:00 Configuring Managed Service Accounts 00:14:00 Working with Complex AD DS Infrastructures Overview of Advanced AD DS Deployments 00:20:00 Deploying a Distributed AD DS Environment 00:45:00 Overview of AD DS Replication 00:12:00 Configuring AD DS Sites 00:38:00 Implementing Group Policy Overview of Group Policy 00:39:00 Creating and Configuring GPOs 00:56:00 Monitoring and Troubleshooting Group Policy 00:18:00 Security Management Using Group Policy 00:54:00 Managing User Environments 00:22:00 Understanding Microsoft Azure AD and Directory Synchronization Planning Directory Synchronization 00:24:00 Implementing Azure AD Connect 00:12:00 Managing Identities with Directory Synchronization 00:14:00 Monitoring and Recovering AD DS Monitoring AD DS 00:27:00 Database Management 00:07:00 Backup and Recovery in AD DS 00:21:00 Implementing Active Directory Certificate Services Overview of Public Key Infrastructure and AD CS 00:17:00 Deploying Certificate Authority Hierarchy 00:19:00 Administering Certificate Authorities 00:13:00 Deploying and Managing Certificates 00:26:00 Managing Revocation and Distribution 00:07:00 Configuring Certificate Recovery 00:08:00 Implementing Active Directory Federation Services (AD FS) Overview of AD FS 00:17:00 Planning and Deploying AD FS 00:35:00 Overview of Web Application Proxy 00:08:00 Implementing Active Directory Rights Management Services Overview of AD RMS 00:14:00 Deploying AD RMS 00:14:00 Protecting Content with AD RMS 00:09:00 Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Windows Server 2016 Complete Video Training
Delivered Online On Demand48 hours
£22

CompTIA Security+ Certification Training Advanced Diploma

3.0(2)

By Alpha Academy

The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Security+ Certification Training Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. Course Curriculum Security Fundamentals The Information Security Cycle 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00

CompTIA Security+ Certification Training Advanced Diploma
Delivered Online On Demand
£10.99

Ethical RFID Hacking

By St. Paul's College

This course begins with a comprehensive introduction to RFID technology, focusing on both low and high-frequency cards. You'll explore the Proxmark3 RDV4 device, a powerful RFID testing tool, learning its installation and implementation to understand how RFID systems can be ethically analysed and tested.

Ethical RFID Hacking
Delivered Online On Demand50 minutes
£11.99

IT Administration and Networking

4.9(27)

By Apex Learning

Overview This comprehensive course on IT Administration and Networking will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT Administration and Networking comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this IT Administration and Networking. It is available to all students, of all academic backgrounds. Requirements Our IT Administration and Networking is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 128 lectures • 00:55:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Identify the Importance of Risk Management: 00:11:00 •Assess Risk: 00:13:00 •Mitigate Risk: 00:24:00 •Integrate Documentation into Risk Management: 00:15:00 •Classify Threats and Threat Profiles: 00:08:00 •Perform Ongoing Threat Research: 00:13:00 •Resources that Aid in Research of Threats: 00:03:00 •Implement Threat Modeling: 00:10:00 •Assess the Impact of Reconnaissance Incidents: 00:11:00 •Performing Reconnaissance on a Network: 00:07:00 •Examining Reconnaissance Incidents: 00:08:00 •Assess the Impact of Social Engineering: 00:11:00 •Assessing the impact of Social Engineering: 00:08:00 •Assessing the Impact of Phishing: 00:03:00 •Types of Wireless Attacks: 00:30:00 •Intrusion Monitoring: 00:08:00 •Wireless Security Risks: 00:22:00 •Authentication Attacks: 00:21:00 •Rogue Devices: 00:04:00 •Public Hotspots: 00:07:00 •Wireless Security Monitoring: 00:21:00 •Device Tracking: 00:18:00 •WLAN Security Infrastructure: 00:38:00 •Management Protocols: 00:23:00 •Other RADIUS Solutions: 00:16:00 •Introduction: 00:30:00 •Child Safety Online: 01:00:00 •Secure Payment Sites: 01:00:00 •Online Banking: 00:30:00 •How To Keep Your Password Safe: 00:30:00 •Common Scams: 01:00:00 •How I Got Pharmed: 01:00:00 •Virus Protection: 01:00:00 •Self Maintenance: 00:30:00 •Personal Information Online: 01:00:00 •Is The Internet Safe?: 00:30:00 •Importance of Cyber Security: 00:30:00 •Spyware Can Destroy: 00:30:00 •How Does Spyware Spread?: 01:00:00 •How To Remove Spyware: 01:00:00 •Anti Spyware Program: 01:00:00 •The Anti Anti-Spyware Programs: 00:30:00 •Research And Learn More: 00:30:00 •Choosing The Best Anti Spyware Tool: 01:00:00 •Computer Security And Spyware: 01:00:00 •The Programs To Avoid: 00:15:00 •Is It Legal?: 00:30:00 •Checklist Of Protection: 00:15:00 •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:00:00 •Recover from a Security Incident: 00:10:00 •OSI Layers: 00:44:00 •LANs and WANs: 00:14:00 •Network Types: 00:07:00 •Transmissions: 00:36:00 •Cables: 00:41:00 •Fiber Optics: 00:17:00 •Converters and Connectors: 00:27:00 •Wireless Security: 00:15:00 •Authentication.prproj: 00:21:00 •Wireless Security Threats: 00:30:00 •TACACS: 00:10:00 •Keys: 00:26:00 •RADIUS: 00:07:00 •VPN Technologies: 00:16:00 •Tunneling Protocols.prproj: 00:05:00 •Acceptable Use: 01:00:00 •Common Problems: 00:32:00 •Troubleshooting: 00:28:00 •Network Technician Tools: 00:46:00 •Physical and Logical Issues: 00:19:00 •Open or Closed Ports: 00:09:00 •ARP Issues: 00:13:00 •Core Concepts in Healthcare IT: 00:06:00 •EMR EHR Issues: 00:05:00 •Regulations, Standards, and Stakeholders: 00:14:00 •HIPAA Controls and Compliance: 00:08:00 •Roles and Responsibilities: 00:10:00 •Manage Communication and Ethics Issues: 00:15:00 •Legal Best Practices, Requirements, and Documentation: 00:09:00 •Medical Document Imaging: 00:04:00 •Sanitation Management: 00:03:00 •Computing Essentials: 00:05:00 •Networking: 00:33:00 •Manage Servers and Software: 00:27:00 •Hardware Support: 00:14:00 •Set Up a Workstation: 00:08:00 •Troubleshoot Basic IT Issues: 00:15:00 •Troubleshoot Medical IT Issues: 00:20:00 •Implementation of an EMR EHR System: 00:34:00 •Change Control: 00:08:00 •Manage Physical and Logical Security: 00:36:00 •Implement Security Best Practices and Threat Mitigation Techniques: 00:13:00 •Manage Remote Access: 00:06:00 •Manage Wireless Security: 00:15:00 •Perform Backups and Disaster Recovery: 00:16:00

IT Administration and Networking
Delivered Online On Demand55 minutes
£12

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19

CompTIA Network+ Certification (N10-007)

4.5(3)

By Studyhub UK

Embark on a transformative journey through the intricate landscape of networking with the CompTIA Network+ Certification (N10-007). This course isn't just about mastering the intricacies of network models or delving into the depths of cabling and topology; it's about empowering yourself with the skills and knowledge to navigate the digital highways of the modern era confidently. Picture yourself as the architect, laying down the foundations of robust networks, securing them against digital threats, and troubleshooting with finesse. With CompTIA Network+ +, you're not just learning; you're shaping your future in information technology. In this comprehensive course, you'll traverse through 22 meticulously crafted sections, each unlocking a new facet of comptia networking. From understanding the fundamentals of TCP/IP to exploring the nuances of wireless networking and delving into virtualization and cloud computing, every lesson is a stepping stone towards network mastery. Through immersive learning experiences and hands-on comptia network+ practice tests, you'll absorb theoretical knowledge and hone your practical skills, preparing you for real-world challenges. Learning Outcomes: Master network models and topologies, laying a strong foundation for network architecture. Demonstrate proficiency in TCP/IP fundamentals and routing protocols for effective data transmission. Develop expertise in securing networks against cyber threats, ensuring data integrity and confidentiality. Acquire skills in network troubleshooting and monitoring, enabling swift resolution of issues. Apply wireless networking and cloud computing knowledge to design and implement scalable network solutions. Why buy this CompTIA Network+ Certification (N10-007)? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the CompTIA Network+ Certification (N10-007) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this CompTIA Network+ Certification (N10-007) for? Aspiring IT professionals seeking to kickstart their careers in networking. Students aiming to enhance their employability with industry-recognized certifications. Career changers looking to transition into the dynamic field of information technology. IT professionals seeking to validate their skills and advance their careers. Anyone passionate about mastering the intricacies of comptia network and carving a niche in the digital landscape. Prerequisites This CompTIA Network+ Certification (N10-007) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network+ Certification (N10-007) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Network Administrator: £20,000 - £45,000 Per Annum Network Engineer: £25,000 - £55,000 Per Annum Systems Administrator: £22,000 - £50,000 Per Annum IT Support Technician: £18,000 - £35,000 Per Annum Cyber Security Analyst: £25,000 - £60,000 Per Annum Cloud Solutions Architect: £30,000 - £80,000 Per Annum Course Curriculum Section 01: Introduction Introduction 00:03:00 Section 02: Network Models What is a Model? 00:02:00 OSI vs. TCP/IP Model 00:07:00 Walking Through OSI and TCP/IP 00:12:00 Meet the Frame 00:06:00 The MAC Address 00:07:00 Broadcast vs. Unicast 00:04:00 Introduction to IP Addressing 00:08:00 Packets and Ports 00:05:00 Section 03: Cabling and Topology Network Topologies 00:10:00 Coaxial Cabling 00:05:00 Twisted Pair Cabling 00:06:00 Cat Ratings 00:06:00 Fiber Optic Cabling 00:09:00 Fire Ratings 00:05:00 Legacy Network Connections 00:07:00 Section 04: Ethernet Basics What is Ethernet? 00:07:00 Ethernet Frames 00:07:00 Early Ethernet 00:08:00 The Daddy of Ethernet, 10BaseT 00:03:00 Terminating Twisted Pair 00:14:00 Hubs vs. Switches 00:13:00 Section 05: Modern Ethernet 100BaseT 00:05:00 Connecting Switches 00:05:00 Gigabit Ethernet and 10-Gigabit Ethernet 00:05:00 Transceivers 00:07:00 Connecting Ethernet Scenarios 00:14:00 Section 06: Installing a Physical Network Introduction to Structured Cabling 00:04:00 Terminating Structured Cabling 00:08:00 Equipment Room 00:07:00 Alternative Distribution Panels 00:04:00 Testing Cable 00:09:00 Troubleshooting Structured Cabling, Part 1 00:05:00 Troubleshooting Structured Cabling, Part 2 00:05:00 Using a Toner and Probe 00:03:00 Wired Connection Scenarios 00:11:00 Section 07: TCP/IP Basics Introduction to IP Addressing and Binary 00:13:00 Introduction to ARP 00:04:00 Classful Addressing 00:10:00 Subnet Masks 00:12:00 Subnetting with CIDR 00:10:00 More CIDR Subnetting Practice 00:10:00 Dynamic and Static IP Addressing 00:18:00 Rogue DHCP Servers 00:07:00 Special IP Addresses 00:07:00 IP Addressing Scenarios 00:15:00 Section 08: Routing Introducing Routers 00:15:00 Understanding Ports 00:05:00 Network Address Translation 00:06:00 Implementing NAT 00:03:00 Forwarding Ports 00:18:00 Tour of a SOHO Router 00:12:00 SOHO vs. Enterprise 00:09:00 Static Routes 00:13:00 Dynamic Routing 00:11:00 RIP 00:04:00 OSPF 00:04:00 BGP 00:06:00 Section 09: TCP/IP Applications TCP and UDP 00:07:00 ICMP and IGMP 00:06:00 Handy Tools 00:07:00 Introduction to Wireshark 00:11:00 Introduction to netstat 00:09:00 Web Servers 00:12:00 FTP 00:12:00 E-mail Servers and Clients 00:09:00 Securing E-mail 00:06:00 Telnet and SSH 00:09:00 Network Time Protocol 00:02:00 Network Service Scenarios 00:10:00 Section 10: Network Naming Understanding DNS 00:12:00 Applying DNS 00:19:00 The Hosts File 00:04:00 Net Command 00:08:00 Windows Name Resolution 00:11:00 Dynamic DNS 00:05:00 DNS Troubleshooting 00:13:00 Section 11: Securing TCP/IP Making TCP/IP Secure 00:04:00 Symmetric Encryption 00:06:00 Asymmetric Encryption 00:03:00 Cryptographic Hashes 00:05:00 Identification 00:12:00 Access Control 00:04:00 AAA 00:05:00 Kerberos/EAP 00:08:00 Single Sign-On 00:10:00 Certificates and Trust 00:14:00 Certificate Error Scenarios 00:08:00 Section 12: Advanced Networking Devices Understanding IP Tunneling 00:06:00 Virtual Private Networks 00:13:00 Introduction to VLANs 00:12:00 InterVLAN Routing 00:03:00 Interfacing with Managed Switches 00:11:00 Switch Port Protection 00:07:00 Port Bonding 00:07:00 Port Mirroring 00:04:00 Quality of Service 00:05:00 IDS vs. IPS 00:04:00 Proxy Servers 00:13:00 Load Balancing 00:09:00 Device Placement Scenarios 00:13:00 Section 13: IPv6 Introduction to IPv6 00:13:00 IPv6 Addressing 00:15:00 IPv6 in Action 00:13:00 IPv4 and IPv6 Tunneling 00:05:00 Section 14: Remote Connectivity Telephony Technologies 00:09:00 Optical Carriers 00:03:00 Packet Switching 00:05:00 Connecting with Dial-up 00:05:00 Digital Subscriber Line (DSL) 00:05:00 Connecting with Cable Modems 00:04:00 Connecting with Satellites 00:03:00 ISDN and BPL 00:04:00 Remote Desktop Connectivity 00:05:00 Advanced Remote Control Systems 00:09:00 Section 15: Wireless Networking Introduction to 802.11 00:12:00 802.11 Standards 00:12:00 Power over Ethernet (PoE) 00:04:00 Antennas 00:09:00 Wireless Security Standards 00:16:00 Implementing Wireless Security 00:07:00 Threats to Your Wireless Network 00:07:00 Retro Threats 00:05:00 Wi-Fi Protected Setup (WPS) 00:05:00 Enterprise Wireless 00:06:00 Installing a Wireless Network 00:15:00 Wireless Scenarios 00:07:00 More Wireless Scenarios 00:09:00 Section 16: Virtualization and Cloud Computing Virtualization Basics 00:07:00 Cloud Ownership 00:03:00 Cloud Implementation 00:12:00 Your First Virtual Machine 00:09:00 NAS and SAN 00:16:00 Platform as a Service (PaaS) 00:09:00 Software as a Service (SaaS) 00:03:00 Infrastructure as a Service (IaaS) 00:10:00 Section 17: Mobile Networking Cellular Technologies 00:05:00 Mobile Connectivity 00:07:00 Deploying Mobile Devices 00:05:00 Mobile Access Control 00:06:00 Section 18: Building a Real-World Network Network Types 00:04:00 Network Design 00:10:00 Power Management 00:06:00 Unified Communications 00:11:00 Network Documentation 00:07:00 Contingency Planning 00:10:00 Predicting Hardware Failure 00:05:00 Backups 00:08:00 Section 19: Managing Risk What is Risk Management? 00:06:00 Security Policies 00:08:00 Change Management 00:07:00 User Training 00:03:00 Standard Business Documentation 00:05:00 Mitigating Network Threats 00:05:00 High Availability 00:05:00 Section 20: Protecting Your Network Denial of Service 00:09:00 Malware 00:10:00 Social Engineering 00:04:00 Access Control 00:08:00 Man-in-the-Middle 00:22:00 Introduction to Firewalls 00:05:00 Firewalls 00:10:00 DMZ 00:06:00 Hardening Devices 00:14:00 Physical Security Controls 00:09:00 Testing Network Security 00:08:00 Network Protection Scenarios 00:14:00 Section 21: Network Monitoring SNMP 00:15:00 Documenting Logs 00:09:00 System Monitoring 00:08:00 SIEM (Security Information and Event Management) 00:07:00 Section 22: Network Troubleshooting Network Troubleshooting Theory 00:05:00

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand23 hours 3 minutes
£10.99

CompTIA Security+

4.5(3)

By Studyhub UK

Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.  The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. Learning Outcomes Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. Acquire proficiency in various cryptographic methods and their importance in securing data. Gain insights into effective identity and account management to enhance system security. Learn to utilize essential security tools for safeguarding individual and network systems. Master the skills to implement and manage security measures for both wired and wireless networks. Why buy this CompTIA Security+? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aiming to start a career in cybersecurity. IT professionals seeking to deepen their knowledge in network security. System administrators wanting to enhance their security skills. Students interested in acquiring a foundational understanding of cybersecurity principles. Professionals aiming to achieve the CompTIA Security+ certification for career advancement. Prerequisites This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Cybersecurity Analyst: £30,000 - £60,000 annually Information Security Manager: £40,000 - £75,000 annually Network Security Engineer: £35,000 - £65,000 annually Security Consultant: £35,000 - £70,000 annually Systems Administrator (with security specialization): £25,000 - £50,000 annually IT Security Coordinator: £28,000 - £55,000 annually Course Curriculum Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00

CompTIA Security+
Delivered Online On Demand19 hours 23 minutes
£10.99

Cyber Awareness

By Global Risk Alliance Ltd

This course aims to increase and enhance delegates’ understanding of the various cyber threats which impact upon them and the organisations, sectors and regions in which they operate and provide them with the tools necessary to mitigate those threats at both a personal and organisational level. It assumes no prior knowledge of the subject but ensures through a high level of interactivity that delegates with any level of experience in the field will be able share and receive the collective knowledge of the group.

Cyber Awareness
Delivered In-Person in InternationallyFlexible Dates
Price on Enquiry

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)

By Packt

The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)
Delivered Online On Demand14 hours 39 minutes
£261.99