• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

642 Courses

Computer Networking and Cyber Security

4.7(160)

By Janets

Register on the Computer Networking and Cyber Security today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Computer Networking and Cyber Security course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Computer Networking and Cyber Security course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Computer Networking and Cyber Security course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.

Computer Networking and Cyber Security
Delivered Online On Demand17 hours 52 minutes
£25

Cyber Security

By The Teachers Training

Cyber Security is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Cyber Security and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 6 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. FUNDAMENTALS OF NETWORKING Network Topologies 00:06:00 History and Applications of Computer Networking 00:06:00 Protocols and Standards 00:04:00 Introduction to OSI Model 00:04:00 Layers of OSI Model 00:07:00 Introduction to TCP/IP Model 00:10:00 OSI Model vs TCP/IP Model 00:04:00 Addressing in Computer Networks 00:09:00 IP Address- IPv4 and IPv6 00:07:00 Classes of IP Address 00:10:00 PRACTICAL : HOW TO FIND OUT YOUR PC's IP ADDRESS 00:03:00 PRACTICAL : HOW TO FIND OUT YOUR PC'S MAC ADDRESS 00:05:00 The Internet Protocol (IP) 00:07:00 Address Resolution Protocol (ARP) 00:09:00 Dynamic Host Configuration Protocol (DHCP) 00:08:00 Internet Control Message Protocol (ICMP) 00:06:00 RIP and OSPF Protocols 00:06:00 PRACTICAL : HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT 00:03:00 What are Sockets? 00:05:00 File Transfer Protocol (FTP) 00:03:00 Hypertext Transfer Protocol (HTTP) 00:04:00 Domain Name System (DNS) 00:03:00 GETTING STARTED WITH CYBER SECURITY Definition of Computer Security 00:03:00 Interesting Facts about Cyber Security 00:05:00 History of Cyber Security 00:07:00 Scope and Career Insights in Cyber Security 00:08:00 LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY Introduction 00:01:00 Types of Computer Security 00:03:00 Key Terms in Cyber Security 00:07:00 The Elements of Information Security 00:06:00 Types of Attacks 00:10:00 Roles in Cyber Security : Part 1 00:08:00 Roles in Cyber Security : Part 2 00:06:00 DIVING DEEP INTO CYBER SECURITY Security Architect's View of Security 00:08:00 What is Vulnerability Assessment? 00:05:00 4 Phases of Vulnerability Assessment 00:09:00 Introduction to Cryptography 00:06:00 Symmetric Encryption 00:03:00 Asymmetric Encryption 00:04:00 Hashing 00:07:00 Security Organizations 00:05:00 Critical Thinking in Cyber Security 00:04:00 The Five Critical Thinking Skills 00:06:00 PRACTICAL : USING NSLOOKUP TOOL 00:03:00 TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES Different types of Actors in Cyber Security 00:10:00 Types of Cyber Attacks 00:04:00 Hacking Organizations around the Globe 00:05:00 Security Services and Mechanisms 00:03:00 Introduction to Threats 00:03:00 What is a Malware? 00:07:00 Types of Trojans 00:06:00 Types of Virus 00:07:00 Have you ever heard about a Ransomware? 00:09:00 The Cyber Kill Chain 00:09:00 Introduction to Social Engineering 00:05:00 Types of Social Engineering 00:07:00 KEY SECURITY CONCEPTS Confidentiality - The Most Important Element of Security 00:04:00 Introduction to Incident Response Team 00:05:00 Phases of Incident Response 00:05:00 Laws in Cyber Security 00:05:00 What are Audits in Cyber Security 00:04:00 Internal Audit vs External Audit 00:04:00 The NIST Framework 00:03:00 The COBIT Framework 00:04:00 FIREWALLS AND ANTIVIRUS Intrusion Detection System 00:05:00 Introduction to Firewalls 00:05:00 What is DMZ? 00:04:00 Different types of Firewalls 00:09:00

Cyber Security
Delivered Online On Demand6 hours 25 minutes
£27.99

IT Security Course

4.3(43)

By John Academy

Course Overview With the advancement of the IT sector, security issues are also rising day by day. Expert professionals are in high demand in order to tackle the threats. If you are an aspiring IT professional, make sure you are well-equipped with the key IT security skills. Our IT Security Course can help you out.  From this course, you will learn the essentials of IT security. The course will help you understand the core security policies and procedures. In addition, the course will describe the essential aspects of network security, operations systems security and web security. The engaging modules will help you enhance your understanding of wireless security and advanced technology used in IT security.  Upon successful completion of the course you will receive a certificate of achievement. This certificate will increase your employability and open doors to new opportunities. Join now! Course Preview Learning Outcomes Learn the fundamentals and key concepts of IT security Enhance your understanding of security policies and procedures Understand the basics of network security, operating systems security and web security Grasp the skills required to ensure wireless security Familiarise yourself with the new trends in network security Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Meticulously crafted engaging and informative tutorial videos and materials Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. What Skills will You Learn from This Course? IT Security Network Security Operating System Security Wireless Security Who Should Take This IT Security Course? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This IT Security Course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ This exclusive IT Security Course will equip you with effective skills and abilities and help you explore career paths such as  Security Analyst Cybersecurity Manager IT Security Auditor Security Architect Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

IT Security Course
Delivered Online On Demand1 hour 56 minutes
£24.99

Linux Security and Hardening

4.7(160)

By Janets

Description Register on the Linux Security and Hardening today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Linux Security and Hardening course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Course Content Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Protected: Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Protected: Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Protected: Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Protected: Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 Protected: File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 Protected: File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment -Linux Security and Hardening 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£25

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1

4.8(9)

By Skill Up

Become a networking expert with Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training. Learn to build and manage networks of all sizes, from simple to complex.

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1
Delivered Online On Demand18 hours 23 minutes
£25

Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training

4.8(9)

By Skill Up

Transform yourself into a promising network engineer who loves to do troubleshooting. Learn Troubleshooting Basic Connectivity, Wide-Area Networks, and Network Device Management.

Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training
Delivered Online On Demand17 hours 23 minutes
£25

70-744 - Securing Windows Server 2016 (MCSE)

4.3(43)

By John Academy

Description: The 70-744 - Securing Windows Server 2016 (MCSE) course explains how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. After completing the course, you will be able to manage the of Active Directory and Identity infrastructures. You will able to handle privileged identities using Just in Time (JIT), and Just Enough Administration (JEA) approaches, as well as implement Privileged Access Workstations (PAWs) and secure servers using the Local Administrator Password Solution (LAPS). The course will also help you to use threat detection solutions such as auditing access, implementing Advanced Threat Analytics (ATA), deploying Operations Management Suite (OMS) solutions, and identifying solutions for specific workloads. Finally, the purpose of the course is to prepare you for the exam Securing Windows Server 2016 ( MCSE). Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-744 - Securing Windows Server 2016 (MCSE) is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-744 - Securing Windows Server 2016 (MCSE) is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Mock Exam Mock Exam- 70-744 - Securing Windows Server 2016 (MCSE) 00:20:00 Final Exam Final Exam- 70-744 - Securing Windows Server 2016 (MCSE) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-744 - Securing Windows Server 2016 (MCSE)
Delivered Online On Demand13 hours 53 minutes
£24

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

Network Engineering

By Compete High

Overview With the ever-increasing demand for Network Engineering in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Network Engineering may be. Learning about Network Engineering or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Network Engineering . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Network Engineering is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Network Engineering course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Network Engineering course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Network Engineering course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Network Engineering , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Network Engineering , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Network Engineering , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Network Engineering course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.   Course Curriculum Module 01 Introduction to Telecommunications Module 01 Introduction to Telecommunications 00:00 Module 02 Signals Carries Over The Network Module 02 Signals Carries Over The Network 00:00 Module 03 Transmission Module 03 Transmission 00:00 Module 04 Mobile Communications Module 04 Mobile Communications 00:00 Module 06 Global System For Mobile Communications Module 06 Global System For Mobile Communications 00:00 Module 07 Application Services of Telecommunication Network Module 07 Application Services of Telecommunication Network 00:00

Network Engineering
Delivered Online On Demand7 hours
£25

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£24