• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6065 Courses

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Understanding your ideal teacher-customer

By Isobel Kent

This short workshop is designed to walk you through the basics of creating a pen portrait of your ideal customer – in this case, teachers. Understand what they want and need, hone your messaging and move towards increasing your visibility.

Understanding your ideal teacher-customer
Delivered Online On Demand1 hour
£5

Understanding and Including children with Anxiety

By Inclusive Solutions

Learn fresh and practical classroom based approaches

Understanding and Including children with Anxiety
Delivered Online On Demand
£149

Create a sustainable Sketchbook/Notebook from recycled Packing Paper

By Nina Vangerow

Join us for a fun and eco-friendly event where you can learn to create a sustainable Sketchbook/Notebook from recycled Packing Paper.

Create a sustainable Sketchbook/Notebook from recycled Packing Paper
Delivered In-PersonFlexible Dates
£25

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience include, but is not limited to:   Relationship managers Customer experience (CX) managers Account managers Service delivery managers Service desk managers Service Level Managers Enterprise Architects Service and Solution Architects Business Analysts Product Owners Marketing Managers Project Managers Portfolio Managers Supplier relationship Managers Vendor Managers Contract Managers Customer experience/User experience Designers Consultants Overview The purpose of this course is to give the delegate the understanding to optimize the value of the journey for all stakeholders, for example, to convert opportunity and demand into value and to drive stakeholder value. Engagement is important in the optimization of service value because, as ITIL Foundation explained, service value is co-created through the involvement of users, customers, sponsors, service providers, or any other stakeholder. This course introduces ways and methods to drive stakeholder value and encourage stakeholders contribute to the creation of service value by exploring the following:   Value propositions Fostering relationships Keeping engagement channels open Shaping demand Designing service offerings Aligning and agreeing expectations Co-creating service experiences Realizing value This course covers key topics such as SLA design, multi-supplier management, communication, relationship management, CX and UX design, customer journey mapping, and more. It will provide candidates with the tools to increase stakeholder satisfaction which is integral to business success in the current competitive landscape. The associated certification exam voucher is included with this course. As an ITIL© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. How customer journeys are designed Understand the concept of the customer journey Understand the ways of designing and improving customer journeys How to target markets and stakeholders Understand the characteristics of markets Understand marketing activities and techniques Know how to describe customer needs and internal and external factors that affect these Know how to identify service providers and explain their value propositions How to foster stakeholder relationships Understand the concepts mutual readiness and maturity Understand the different supplier and partner relationship types, and how these are managed Know how to develop customer relationships Know how to analyze customer needs Know how to use communication and collaboration activities and techniques Know how the ?Relationship management? practice can be applied to enable and contribute to fostering relationships Know how the ?Supplier management? practice can be applied to enable and contribute to supplier and partner relationships management How to shape demand and define service offerings Understand methods for designing digital service experiences based on value driven, data driven and user centered service design Understand approaches for selling and obtaining service offerings Know how to capture, influence and manage demand and opportunities Know how to collect, specify and prioritize requirements from a diverse range of stakeholders Know how the ?Business analysis? practice can be applied to enable and contribute to requirement management and service design How to align expectations and agree details of services Know how to plan for value co-creation Know how to negotiate and agree service utility, warranty and experience Know how the ?Service level management? practice can be applied to enable and contribute to service expectation management How to onboard and offboard customers and users Understand key transition, onboarding and offboarding activities Understand the ways of relating with users and fostering user relationships Understand how users are authorized and entitled to services Understand different approaches to mutual elevation of customer, user and service provider capabilities Know how to prepare onboarding and offboarding plans Know how to develop user engagement and delivery channels Know how the ?Service Catalogue management? practice can be applied to enable and contribute to offering user services Know how the ?Service Desk? practice can be applied to enable and contribute to user engagement How to act together to ensure continual value co-creation Understand how users can request services Understand methods for triaging of user requests Understand the concept of user communities Understand methods for encouraging and managing customer and user feedback Know how to foster a service mindset (attitude, behavior and culture) Know how to use different approaches to provision of user services Know how to seize and deal with customer and user ?moments of truth? Know how the ?Service request management? practice can be applied to enable and contribute to service usage How to realize and validate service value Understand methods for measuring service usage and customer and user experience and satisfaction Understand charging mechanisms Know how to assess service value realization Know how to prepare to evaluate and improve the customer journey Know how the ?Portfolio management? practice can be applied to enable and contribute to service value realization ITIL© is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo? is a trade mark AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. IT Infrastructure Library© is a registered trade mark of the AXELOS Limited used, under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 Nexus Humans ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ITIL 4 Specialist Drive Stakeholder Value (DSV) with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ITIL 4 Managing Professional - Drive Stakeholder Value (DSV) with Exam
Delivered OnlineFlexible Dates
£2,385

Creating an Unresourced Project with Oracle Primavera P6 PPM

By Packt

This course is designed for project managers and planners who need to plan and manage projects without resources in Oracle Primavera P6 PPM. You will learn how to navigate the user interface, create project plans, define activities, and manage project timelines without relying on resource constraints.

Creating an Unresourced Project with Oracle Primavera P6 PPM
Delivered Online On Demand6 hours 26 minutes
£26.99

Thought Leadership That Drives Customer Acquisition

By Entreprenure Now

Thought leadership can bring your message to customers and afford them a chance to understand and connect with your brand on a deeper level. This course presents examples of thought leadership and an in-depth look at how to leverage this form of free content marketing, which includes blogs, reports, speaking gigs, PR, and more, to your advantage. A workshop developed to support you work with the thought leadership prep worksheet completes this course.

Thought Leadership That Drives Customer Acquisition
Delivered Online On Demand
£19.99

Balkan Melody Mastery

5.0(2)

By North West London Music Lessons

MAGIC BALKAN MUSIC ACADEMY Balkan Melody Mastery Learn great Balkan tunes and how to play them amazingly. When? Wednesday evenings, 19:00 – 20:30h GMT Where? Online on ZOOM, limited spaces in-person in Kenton, London HA3 This course will explore authentic Balkan tunes, emphasizing essential techniques for playing with precision and expression. The curriculum is taught via a mixture of by-ear learning and sheet music, allowing participants to delve into dynamic phrasing, articulation, ornamentation, tone, and speed. The course also offers exercises to enhance overall technique and flexibility. Details Wednesday evenings, 19:00 – 20:30h GMT Start on the 17th January 2024. The course will run weekly throughout the year, expect school holidays. Booking either annually on a 6-weekly direct debit or by booking 5-lesson units (more info below) Location: Online on zoom – limited in-person spaces in London HA3 Participants: players of melodic instruments from intermediate to advanced. Fee: £60/£45 concessions for 1 Unit of 5 weeks (half a term). Discounts when signing up until the end of the academic year   Booking Page: Click here to read details of payment and sign up for the course. Read below for extra events, extra discounts and all-inclusive fees. Watch Information Videos and including small demonstrations. Detailed Information The Balkan region is known for its rich and diverse musical heritage, which has been influenced by various cultures and traditions over the centuries. I am launching this new course to share the finer things about Balkan music. The correct notes can be played by any musician, but how often do I find myself in tears when listening to a great musician who gets it so wrong, simply because they did not have the opportunity to travel, listen, and learn from native masters? Instead, they might have learned it third-hand or from a piece of sheet music. Western classical music notation cannot fully capture the essence of other types of music, and a metronome can stifle the authentic phrasing of asymmetric Balkan rhythms. I am not a native Balkan music master either, but I feel very privileged that I had the opportunity to learn from several of them, and engage in endless, wild jam sessions. In this course, I aim to convey not only the right musical feel but also the fervour and passion for this music. The weekly course primarily targets melodic instruments. Tunes will be taught by ear, initially using the voice (sheet music will be sent out beforehand), and then practiced on the instrument. Special attention will be devoted to phrasing, articulation, and, of course, the typical charisma of Balkan music to give it that truly magical sound. Whilst I am a violinist and will demonstrate and lead with the violin and voice, the course is suitable for any melodic instrument. The level is aimed at intermediate to advanced players, although ambitious and diligent lower-intermediate players will also do well. We will briefly cover accompaniment aspects, including chord progressions, rhythm patterns, and techniques. Dedicated workshops for chordal instruments and percussion will be offered as we progress. The course will run weekly and continuously, with no regular sessions during usual UK school holidays. Booking will be in advance in 5-session units. Each unit can be booked individually, or you can sign up for an annual booking and pay in 6 instalments distributed over the whole year, receiving a 20% discount on the total course fee. For precise dates and a detailed payment plan please visit the BOOKING page. Information Videos about the general aims and philosophy of the course how to achieve expressive ornamentation how the accompaniments relate to the tunes Additional Events Balkan Academy Jam Session: A music making session, 3 times a year (towards the end of each term), online and in person, where course participants and their friends can play the studied material with a full-on group, including rhythm section and vocals.  Fee: £9 for course participants, £12 for others - sheet music downloads included Dates to be announced.   Chord Progressions and Accompaniment Special: A special workshop three times a year for guitars, accordions, pianos, bass players, and similar instruments, both online and in person. This workshop delves into the details of chord progressions and accompaniment patterns, including riffs and breaks. It will be co-hosted by an experienced guitarist. Fee: £9 for course participants, £12 for others. Dates to be announced. Balkan Percussion Special: A workshop designed for percussionists to study the rhythm patterns and techniques related to the course material. This workshop will be co-hosted by an experienced Balkan percussionist. It is tailored to friends and bandmates of the Balkan Melody Mastery course participants, allowing the pieces to be performed together in your own groups and jam sessions.  Fee: £9 for course participants, £12 for others. Dates to be announced.

Balkan Melody Mastery
Delivered OnlineFlexible Dates
£45 to £65

MACRAME - LEARN TO MAKE A PLANT HANGER

By Golden Rope

Learn to make your own bright and happy plant hangers in this beginner macrame class! No prior experience is needed. In this workshop, instructor Rahamatullah will lead as you learn: • How to begin a macrame piece, including an overview of necessary materials. • How to work several different macrame knots. • How to incorporate a wooden ring and wooden beads. • Leave with a finished plant hanger, and the know-how to design and create more pieces on your own. More benefits: no mistakes possible (you can always start over during the process), and great for reflexes and memory!

MACRAME - LEARN TO MAKE A PLANT HANGER
Delivered OnlineFlexible Dates
£40

MACRAME - LEARN TO MAKE A PLANT HANGER

By Golden Rope

Learn to make your own bright and happy plant hangers in this beginner macrame class! No prior experience is needed. In this workshop, instructor Rahamatullah will lead as you learn: • How to begin a macrame piece, including an overview of necessary materials. • How to work several different macrame knots. • How to incorporate a wooden ring and wooden beads. • Leave with a finished plant hanger, and the know-how to design and create more pieces on your own. More benefits: no mistakes possible (you can always start over during the process), and great for reflexes and memory!

MACRAME - LEARN TO MAKE A PLANT HANGER
Delivered OnlineFlexible Dates
£40