• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

338 Courses

IT Support Technician

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special IT Support Technician Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The IT Support Technician Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This IT Support Technician Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This IT Support Technician Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this IT Support Technician? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the IT Support Technician there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This IT Support Technician course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This IT Support Technician does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This IT Support Technician is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 00:30:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00 Assignment Assignment - IT Support Technician 00:00:00

IT Support Technician
Delivered Online On Demand48 hours
£10.99

The Complete Pentesting and Privilege Escalation Course

By Packt

We are in such an era where cyber security plays an important part. With systems getting smarter, we are seeing machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it is important for pentesters and security researchers to understand the working of these systems and how to breach them.

The Complete Pentesting and Privilege Escalation Course
Delivered Online On Demand12 hours 16 minutes
£14.99

Positive Psychology Masterclass

4.9(27)

By Apex Learning

Overview This comprehensive course on Positive Psychology Masterclass will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Positive Psychology Masterclass comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Positive Psychology Masterclass. It is available to all students, of all academic backgrounds. Requirements Our Positive Psychology Masterclass is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 13 sections • 164 lectures • 08:40:00 total length •Create Capacity for True Success: 00:06:00 •Disconnect From the Grind: 00:04:00 •Create the Routine to Disconnect: 00:02:00 •Commit To the Disconnect Process: 00:02:00 •Activity: Define Your Disconnect Time: 00:02:00 •Stop Negative Self-Talk In Its Tracks: 00:05:00 •Identify Your Source of Pain: 00:01:00 •Acknowledge the Negative Thought: 00:02:00 •Define Yourself Relative to the Thought: 00:04:00 •Describe a New Reality: 00:04:00 •Verbalize the Positive Thought: 00:03:00 •Activity: Release a Negative Thought: 00:02:00 •Keep Your Joy Intact and Healthy With Positive Thoughts: 00:03:00 •Play the Vulnerability Game: 00:02:00 •Create Healthy Boundaries to Stay Positive: 00:03:00 •Make Your Process Attainable: 00:02:00 •Activity: Make Your Positivity a Reality: 00:01:00 •Become a Grounded Person Others Are Attracted To: 00:08:00 •Identify What Gives You Anxiety and Frustrations: 00:02:00 •Assume You're Not Grounded: 00:06:00 •Track What You Feel Obligated to Do: 00:04:00 •Identify When You Can't Turn Your Mind Off: 00:02:00 •Activity: Identify What Gives You Anxiety and Frustrations: 00:02:00 •Ground Yourself in A Positive Way: 00:03:00 •Assume You Are Not Fully Grounded: 00:02:00 •Assume You Have Nothing to Prove to Anybody: 00:01:00 •Set Aside Enough Time To Become Grounded: 00:02:00 •Discover the Grounding Breathing Exercise: 00:04:00 •Discover the Grounding Finger Exercise: 00:03:00 •Apply These Physical Grounding Exercises Daily In Your Life: 00:03:00 •Activity: Ground Yourself in A Positive Way: 00:02:00 •Solve Your Anxiety with Gratitude: 00:07:00 •Create a Gratitude Journal: 00:01:00 •Activity: Solve Your Anxiety with Gratitude: 00:01:00 •Solve Your Frustrations by Turning Them Around: 00:13:00 •Activity: Solve Your Frustrations by Turning Them Around: 00:01:00 •Be Significant Consistently: 00:10:00 •Become More Curious (Vs. Impressive) with People: 00:05:00 •Employ Curiosity Daily to Boost Your Positivity: 00:10:00 •Activity: Boost Your Baseline Positivity with Curiosity: 00:02:00 •Become a Good Judge of Character: 00:05:00 •Employ Character Assessing Questions: 00:04:00 •Assess Character during Conversation: 00:03:00 •Activity: Define and Identify High-Character for Yourself: 00:01:00 •Give and Expect Nothing In Return: 00:05:00 •Avoid Survival Mode: 00:02:00 •Activity: Be Comfortable Being Overt About Giving: 00:01:00 •Make People Feel Safe around You: 00:03:00 •Create Gratitude, Curiosity, and Optimism: 00:02:00 •Express Gratitude: 00:02:00 •Develop Curiosity: 00:02:00 •Practice Optimism: 00:02:00 •Activity: Enhance Your Three P's Of Mental Aptitude: 00:01:00 •Stay Even-Tempered and Patient: 00:04:00 •Recognize When You Are Being a Hare and Discourage the Rat: 00:03:00 •Activity: Map Your Positive Vision for Your Life: 00:02:00 •Maintain Responsibility and Realism: 00:02:00 •Set Positive, Realistic Goals Responsibly: 00:06:00 •Activity: Be Responsible For a Realistic Vision: 00:01:00 •Keep Your Hard Work from Going out The Window: 00:05:00 •Master Your Character and Concentration: 00:04:00 •Turn Around Character-Lacking Behaviors: 00:05:00 •Master Your Focus: 00:05:00 •Activity: Concentrate On Your Character to Master Positivity: 00:01:00 •Master Your Confidence and Courage: 00:02:00 •Grow the Seeds of Confidence: 00:03:00 •Have Courage to Put Your Confidence to Work: 00:03:00 •Use Courage to Grow Confidence: 00:02:00 •Activity: Grow Your Confidence and Courage: 00:02:00 •Identify and Mastery Your Capacity: 00:06:00 •Stabilize the Rollercoaster with Consistency: 00:05:00 •Activity: Manage Your Capacity and Consistency: 00:02:00 •How to Overcome Constant Negativity: 00:05:00 •Let Go of Holding Grudges: 00:03:00 •Redefine Your Success in Challenging Situations: 00:02:00 •Examine Non-Successful Situations: 00:01:00 •Determine Your Control over Upsetting Events: 00:02:00 •Activity: Release a Grudge: 00:02:00 •Be Difficult To Offend: 00:03:00 •Become Others-Focused: 00:05:00 •Activity: Write an Others-Focused Mission Statement: 00:01:00 •Neutralize Toxic People: 00:07:00 •Neutralize Toxic People Already In Your Life: 00:05:00 •Activity: Neutralize Toxic People: 00:02:00 •Don't Just Talk About 'It,' Be 'It': 00:04:00 •Identify How Gritty You Are: 00:01:00 •Describe Your Own Grit: 00:01:00 •Activity: Take the Grit Scale Assessment: 00:02:00 •Set Up Your Environment for Self-Control: 00:02:00 •Get Some Sleep: 00:01:00 •Purge Yourself of Negativity: 00:02:00 •Follow a Healthy, Daily Routine: 00:01:00 •Live With Zest and Excitement: 00:01:00 •Rise Up and Be Real: 00:02:00 •Activity: Incorporate the Five Healthy/Daily Habits in Your Life: 00:02:00 •Make Your Grit Sustainable: 00:02:00 •Direct Yourself to Sustained Grit: 00:02:00 •Focus On Solutions, Not Problems: 00:02:00 •Activity: Self-Coach To Sustain Your Grit: 00:01:00 •Become More Comfortable In Your Own Skin: 00:06:00 •Become More Relaxed: 00:02:00 •Work On Yourself to Help Others: 00:05:00 •Try a Form of Meditation: 00:02:00 •Activity: Create a Gratitude List: 00:01:00 •Get Physically Fit: 00:10:00 •Exercise to Feel Alive: 00:04:00 •Get to Sleep: 00:03:00 •Activity: Identify New Positive Healthy Habits: 00:01:00 •Develop Strong Body Language: 00:04:00 •Make a Strong First Impression: 00:04:00 •Make Eye Contact: 00:03:00 •Present Good Posture: 00:03:00 •Activity: Develop Strong Body Language: 00:02:00 •Practice the Respect That People Gravitate Toward: 00:04:00 •Identify Positive Boundaries: 00:04:00 •Demonstrate Positive Boundary Practices: 00:04:00 •Protect Your Mental and Emotional Health: 00:03:00 •Activity: Identify Your Positive Boundaries: 00:01:00 •Recognize Boundaries Where You Fall Short: 00:02:00 •Create Your Own Boundaries: 00:03:00 •Make Creating and Evaluating Them Routine: 00:02:00 •Activity: Reign in Your Boundary Short-Comings: 00:02:00 •Use Grit to Enforce: 00:02:00 •Use Conative Strengths to Enforce: 00:03:00 •Determine Your Boundary Enforcement Helpers: 00:02:00 •Activity: Enforce Your Boundaries: 00:01:00 •Become the Person You Are Meant To Be: 00:07:00 •Know Yourself through Strengths and Weaknesses: 00:07:00 •Solicit Input from Leaders: 00:03:00 •Enhance Your Strengths: 00:03:00 •Activity: Self-Identify Your Strengths: 00:01:00 •Embrace Change in Your Life: 00:04:00 •Become Proactive To Welcome Change In Your Life: 00:08:00 •Activity: Embrace Change to Achieve a Goal: 00:01:00 •Learn To Say 'No': 00:09:00 •Learn To Say No To Other Non-Key Commitments: 00:05:00 •Use Your Positive Success to Bring Positive Success to Others: 00:05:00 •Identify Your Greatest Gift for Others: 00:02:00 •Seek Outside Counsel: 00:02:00 •Assess To Gain Understanding: 00:02:00 •Activity: Consolidate Insights on Your Gift: 00:02:00 •Live Out the People You Serve: 00:04:00 •Honor Your Commitments to Your Team: 00:03:00 •Honor Your Commitments to Yourself: 00:03:00 •Activity: Reflect On Your Business Practices: 00:02:00 •Live Out How Well You Serve Others: 00:02:00 •Harness Your Vision: 00:02:00 •Be a Go-Giver: 00:02:00 •Activity: Apply the Five Laws: 00:01:00 •Be Free From a World of Struggle and Hurt: 00:09:00 •Identify Whose Business It Is: 00:02:00 •Identify When It's Your Business: 00:02:00 •Identify When It's Other People's Business: 00:05:00 •Activity: Identify Whose Business It Is: 00:01:00 •Find Safety to Detach: 00:01:00 •Separate Your Life from Who You Are As a Person: 00:05:00 •Separate a Value from a Thought: 00:06:00 •Show Empathy without Picking up The Rope: 00:11:00 •Activity: Find Safety to Detach: 00:02:00 •Look Forward to the Next No: 00:01:00 •Take Turtle Steps to Detach: 00:03:00 •Take Bigger Steps to the Next No: 00:06:00 •Activity: Look Forward to the Next No: 00:01:00 •Assignment - Positive Psychology Masterclass: 00:00:00

Positive Psychology Masterclass
Delivered Online On Demand8 hours 40 minutes
£12

IT Support Technician

4.5(3)

By Studyhub UK

Navigate the multifaceted domain of IT support with our 'IT Support Technician' course, a pathway to mastering the essentials of technology support in diverse environments. This curriculum embarks on a comprehensive journey, beginning with the foundational aspects of software, including operating systems and application management. As you move through the modules, you'll encounter a blend of technical knowledge and practical application, from understanding the intricacies of software licensing to mastering hardware devices and peripherals. This course is meticulously structured to equip you with not just the theoretical aspects of IT support, but also the hands-on skills required for effective troubleshooting and problem-solving in real-world scenarios. Progressing further, the course delves into the critical areas of security, including risk management, cybersecurity, and data protection. You'll gain insights into managing various threats and vulnerabilities, alongside learning the importance of robust security protocols. The course also encompasses essential knowledge in networking, covering topics from OSI layers to wireless security, preparing you for the complex nature of modern networks. Concluding with modules on basic IT literacy, the program ensures you are well-versed in healthcare IT, server management, and effective communication within IT roles. By the end of this course, you'll have a thorough understanding of the diverse components that make up IT support, ready to tackle challenges and advance your career in this dynamic field. Learning Outcomes Develop a comprehensive understanding of software systems and operating system configurations. Master the skills in hardware setup, peripheral management, and troubleshooting. Acquire in-depth knowledge of network infrastructure and wireless security. Learn to manage IT risks and implement robust cybersecurity measures. Gain expertise in healthcare IT and the implementation of EMR/EHR systems. Why choose this IT Support Technician course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this IT Support Technician course for? Aspiring IT support technicians and helpdesk professionals. Individuals seeking to transition into IT roles or enhance their tech skills. Professionals in healthcare IT looking to deepen their understanding of EMR systems. Small business owners or managers responsible for their IT infrastructure. Students pursuing a career in network or systems administration. Career path IT Support Technician: £20,000 - £35,000 Network Administrator: £25,000 - £40,000 Systems Administrator: £27,000 - £45,000 Cybersecurity Analyst: £30,000 - £55,000 Healthcare IT Specialist: £26,000 - £42,000 Helpdesk Manager: £28,000 - £48,000 Prerequisites This IT Support Technician does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Recover from a Security Incident 00:10:00 Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Common Scams 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Hardware and Peripherals 00:07:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:50:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Support Technician
Delivered Online On Demand3 days
£10.99

BUNDLE - Reclaiming Your Masculine & Feminine + Your Path to Wholeness

5.0(14)

By Numinity

Unlock your true potential with the Reclaiming Your Masculine and Feminine Toolkit! This comprehensive resource offers transformative exercises, including daily self-awareness prompts, boundary-building tools, emotional regulation techniques, and breathwork practices. Balance your energies, enhance self-awareness, and align with your purpose. Perfect for anyone looking to deepen their personal growth journey. Embrace your power today!

BUNDLE - Reclaiming Your Masculine & Feminine + Your Path to Wholeness
Delivered Online On Demand5 weeks
£80

CompTIA Security+ Certification Training Advanced Diploma

3.0(2)

By Alpha Academy

The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Security+ Certification Training Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. Course Curriculum Security Fundamentals The Information Security Cycle 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00

CompTIA Security+ Certification Training Advanced Diploma
Delivered Online On Demand
£10.99

Care and Support for Vulnerable Children - CPD Certified

5.0(3)

By School Of Health Care

Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Online This Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course aims to provide a clear understanding of working closely with children as well as identifying and supporting those at risk. Throughout the course, practical examples will be used. This course will also provide you with a thorough understanding of your role in working with children and young people. This Care and Support for Vulnerable Children course will teach you how to care for and support vulnerable children by utilising a wide range of educational online study resources and also how to develop awareness and knowledge in order to provide a safe environment for vulnerable people. The Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course also covers government policies, the history of the field, and much more. Learning Outcomes After completing this Care and Support for Vulnerable Children course, you will be able to: Know how to recognise vulnerable children. Understanding the Importance of Awareness in Education. Understand Child Rights and Its Importance. Know the Difference Between Vulnerability and Risk. Learn about Child Crisis. Learn about Identifying the Organizations Providing Support. Learn the the Support for Children With SEN and Disabilities. Know about the History of Child Protection in the UK. This Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course is made up of a series of simple, in-depth modules that will provide you with a thorough information. Children and adolescents who have been separated from their parents are clearly vulnerable groups. Furthermore, extreme poverty, chronic illness in oneself or one's parents, and a lack of social support and education make young people vulnerable to abuse, neglect, deprivation, and violence. As a responsible adult, it is your responsibility to protect children and adults from all forms of abuse. ThisCare and Support for Vulnerable Children: Care and Support for Vulnerable Children course will walk you through the fundamentals. This course will also teach you how to perform on unresponsive casualties and how to assist them. You will also learn how to handle common problems and perform basic maintenance, as well as identify vulnerable children, health care, and other areas. In addition, how to work with children and adolescents, and how adults can support children in times of crisis. This Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course will ensure that you stand out from the crowd. [ Note: Free PDF certificate will provide as soon as completing the Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Course] Course Curriculum of Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Module 01: Introduction Module 02: The Rights of Children Module 03: Understanding the Distinction Between Vulnerability and Risk Module 04: Child in Crisis Module 05: Controlling The Issues Module 06: Available Services Module 07: History and Future Developments Assessment Method of Care and Support for Vulnerable Children: Care and Support for Vulnerable Children After completing Care and Support for Vulnerable Children Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Apart from this, you do not need to sit for any other assessments. Certification of Care and Support for Vulnerable Children: Care and Support for Vulnerable Children After completing the Care and Support for Vulnerable Children course, you can instantly download your certificate for FREE. The hard copy of the certification will also be delivered to your doorstep via post, which will cost £13.99. Who is this course for? Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Online Everyone is welcome to take our Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course. This Care and Support for Vulnerable Children: Care and Support for Vulnerable Children course is ideal for those who want to gain in-depth knowledge and efficient skills so that they can enter the relevant sector as a promising potential. Requirements Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Online To enrol in this Care and Support for Vulnerable Children Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Care and Support for Vulnerable Children Course. Be energetic and self-motivated to complete our Care and Support for Vulnerable Children Course. Basic computer Skill is required to complete our Care and Support for Vulnerable Children Course. If you want to enrol in our Care and Support for Vulnerable Children Course, you must be at least 15 years old. Career path Care and Support for Vulnerable Children: Care and Support for Vulnerable Children Online Our Care and Support for Vulnerable Children: Care and Support for Vulnerable Childrencourse is intended to help you land your dream job or even the promotion you've always desired. Learn the necessary skills and knowledge to excel in your professional life with the assistance and guidance of this course.

Care and Support for Vulnerable Children - CPD Certified
Delivered Online On Demand3 hours
£12

IT Administration and Networking

4.9(27)

By Apex Learning

Overview This comprehensive course on IT Administration and Networking will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT Administration and Networking comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this IT Administration and Networking. It is available to all students, of all academic backgrounds. Requirements Our IT Administration and Networking is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 128 lectures • 00:55:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Identify the Importance of Risk Management: 00:11:00 •Assess Risk: 00:13:00 •Mitigate Risk: 00:24:00 •Integrate Documentation into Risk Management: 00:15:00 •Classify Threats and Threat Profiles: 00:08:00 •Perform Ongoing Threat Research: 00:13:00 •Resources that Aid in Research of Threats: 00:03:00 •Implement Threat Modeling: 00:10:00 •Assess the Impact of Reconnaissance Incidents: 00:11:00 •Performing Reconnaissance on a Network: 00:07:00 •Examining Reconnaissance Incidents: 00:08:00 •Assess the Impact of Social Engineering: 00:11:00 •Assessing the impact of Social Engineering: 00:08:00 •Assessing the Impact of Phishing: 00:03:00 •Types of Wireless Attacks: 00:30:00 •Intrusion Monitoring: 00:08:00 •Wireless Security Risks: 00:22:00 •Authentication Attacks: 00:21:00 •Rogue Devices: 00:04:00 •Public Hotspots: 00:07:00 •Wireless Security Monitoring: 00:21:00 •Device Tracking: 00:18:00 •WLAN Security Infrastructure: 00:38:00 •Management Protocols: 00:23:00 •Other RADIUS Solutions: 00:16:00 •Introduction: 00:30:00 •Child Safety Online: 01:00:00 •Secure Payment Sites: 01:00:00 •Online Banking: 00:30:00 •How To Keep Your Password Safe: 00:30:00 •Common Scams: 01:00:00 •How I Got Pharmed: 01:00:00 •Virus Protection: 01:00:00 •Self Maintenance: 00:30:00 •Personal Information Online: 01:00:00 •Is The Internet Safe?: 00:30:00 •Importance of Cyber Security: 00:30:00 •Spyware Can Destroy: 00:30:00 •How Does Spyware Spread?: 01:00:00 •How To Remove Spyware: 01:00:00 •Anti Spyware Program: 01:00:00 •The Anti Anti-Spyware Programs: 00:30:00 •Research And Learn More: 00:30:00 •Choosing The Best Anti Spyware Tool: 01:00:00 •Computer Security And Spyware: 01:00:00 •The Programs To Avoid: 00:15:00 •Is It Legal?: 00:30:00 •Checklist Of Protection: 00:15:00 •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:00:00 •Recover from a Security Incident: 00:10:00 •OSI Layers: 00:44:00 •LANs and WANs: 00:14:00 •Network Types: 00:07:00 •Transmissions: 00:36:00 •Cables: 00:41:00 •Fiber Optics: 00:17:00 •Converters and Connectors: 00:27:00 •Wireless Security: 00:15:00 •Authentication.prproj: 00:21:00 •Wireless Security Threats: 00:30:00 •TACACS: 00:10:00 •Keys: 00:26:00 •RADIUS: 00:07:00 •VPN Technologies: 00:16:00 •Tunneling Protocols.prproj: 00:05:00 •Acceptable Use: 01:00:00 •Common Problems: 00:32:00 •Troubleshooting: 00:28:00 •Network Technician Tools: 00:46:00 •Physical and Logical Issues: 00:19:00 •Open or Closed Ports: 00:09:00 •ARP Issues: 00:13:00 •Core Concepts in Healthcare IT: 00:06:00 •EMR EHR Issues: 00:05:00 •Regulations, Standards, and Stakeholders: 00:14:00 •HIPAA Controls and Compliance: 00:08:00 •Roles and Responsibilities: 00:10:00 •Manage Communication and Ethics Issues: 00:15:00 •Legal Best Practices, Requirements, and Documentation: 00:09:00 •Medical Document Imaging: 00:04:00 •Sanitation Management: 00:03:00 •Computing Essentials: 00:05:00 •Networking: 00:33:00 •Manage Servers and Software: 00:27:00 •Hardware Support: 00:14:00 •Set Up a Workstation: 00:08:00 •Troubleshoot Basic IT Issues: 00:15:00 •Troubleshoot Medical IT Issues: 00:20:00 •Implementation of an EMR EHR System: 00:34:00 •Change Control: 00:08:00 •Manage Physical and Logical Security: 00:36:00 •Implement Security Best Practices and Threat Mitigation Techniques: 00:13:00 •Manage Remote Access: 00:06:00 •Manage Wireless Security: 00:15:00 •Perform Backups and Disaster Recovery: 00:16:00

IT Administration and Networking
Delivered Online On Demand55 minutes
£12

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7
Delivered Online On Demand3 weeks
£100

The Complete Guide for SQL with Microsoft SQL Server

By Packt

In this comprehensive course, you will learn everything you need to know about SQL and Microsoft SQL Server, from the basic to advanced topics. With easy-to-follow lessons and hands-on exercises, you will gain the skills and confidence to work with databases like a pro. Perfect for beginners and anyone looking to expand their data management skills.

The Complete Guide for SQL with Microsoft SQL Server
Delivered Online On Demand7 hours 52 minutes
£82.99