• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1088 Courses

Risk Assessment Training - CPD Certified

4.7(47)

By Academy for Health and Fitness

24 Hours Left! Don't Let the Winter Deals Slip Away - Enrol Now! Risk Assessment and Management is important for any business to grow and succeed. Learn the importance of risk assessment and management in this course. Explore the hazards and risks to update the necessary control measures for your organisation. Know the fundamentals of accident reports and the appropriate risk management techniques. Make a disaster recovery plan that will help in your business Risk Assessment actions. If you are someone who wants to pursue a career in risk management, then this Risk Assessment course is very suitable for you. Learning Outcomes of Risk Assessment: After completing this risk assessment course, learners will be able to: Gain in-depth knowledge about risk assessment and its types Know more about the risk evaluation process Learn how to manage risk at the workplace Get to know what are the benefits of risk assessment Increase your financial and technological risk assessment skills So, join our comprehensive risk assessment course before the offer ends and complete it at your earliest convenience. Why Choose Our Risk Assessment Course? Opportunity to earn a certificate accredited by CPD. Get a free student ID card with this Risk Assessment Get instant access to this Risk Assessment course. Learn Risk Assessment from anywhere in the world Risk Assessment is affordable and simple to understand Risk Assessment is entirely online, interactive lesson with voiceover audio Lifetime access to the Risk Assessment course materials Risk Assessment comes with 24/7 tutor support *** Course Curriculum of the Risk Assessment Course *** Module 01: Risk and Types of Risk Overview of various risks, including financial, operational, strategic, and compliance risks, and their potential impacts on businesses. Module 02: The Risk Evaluation Process Introduction to the process of evaluating risks, including identification, assessment, and prioritisation of risks. Module 03: Risk Analysis & Assessment Covers techniques for analysing and assessing risks, focusing on qualitative and quantitative methods. Module 04: Risk Assessment and Common Risks Discussion on conducting risk assessments and identifying common risks faced by organisations. Module 05: Introduction to Risk Management Provides a foundation in risk management, including key concepts, principles, and the importance of managing risks effectively. Module 06: Risk Management Process Detailed overview of the risk management process, from risk identification to monitoring and review. Module 07: Benefits of Risk Management Highlights the advantages of effective risk management, such as improved decision-making, reduced losses, and enhanced business resilience. Module 08: Enterprise Risk Management Explores enterprise risk management (ERM) frameworks and their application in managing risks across an organisation. Module 09: Managing Financial Risks Focuses on identifying and managing financial risks, including market, credit, and liquidity risks. Module 10: Managing Technology Risks Discusses strategies for managing technology risks, including cybersecurity, data protection, and IT system failures. Assessment Start your learning journey straight away with this Risk Assessment course and take a step toward a brighter future! The Risk Assessment course is designed to provide participants with a comprehensive understanding of the principles, methodologies, and techniques involved in effectively assessing and managing risks. In today's dynamic business environment, organisations face a wide range of risks that can have a significant impact on their operations, finances, and reputation. This Risk Assessment course equips learners with the knowledge and skills needed to identify, analyse, evaluate, and mitigate risks across various domains. CPD 10 CPD hours / points Accredited by CPD Quality Standards Module 1: Risk and Types of Risk 11:15 1: Risk and Types of Risk Preview 11:15 Module 2: The Risk Evaluation Process 20:16 2: The Risk Evaluation Process 20:16 Module 3: Risk Analysis & Assessment 15:04 3: Risk Analysis & Assessment 15:04 Module 4: Risk Assessment and Common Risks 11:31 4: Risk Assessment and Common Risks 11:31 Module 5: Introduction to Risk Management 13:06 5: Introduction to Risk Management 13:06 Module 6: Risk Management Process 08:38 6: Risk Management Process 08:38 Module 7: Benefits of Risk Management 08:47 7: Benefits of Risk Management 08:47 Module 8: Enterprise Risk Management 15:39 8: Enterprise Risk Management 15:39 Module 9: Managing Financial Risks 20:22 9: Managing Financial Risks 20:22 Module 10: Managing Technology Risks 14:04 10: Managing Technology Risks 14:04 Order Your Certificate 02:00 11: Order Your CPD Certificate 01:00 12: Order Your QLS Endorsed Certificate 01:00 Who is this course for? Risk Assessment This risk assessment course is available to all. So, if you are interested in learning more about this topic, enrol and start your learning journey now. Requirements Risk Assessment You don't need any prior knowledge or qualifications to join this risk assessment course. Career path Risk Assessment After the completion of this risk assessment course. Certificates Certificate Accredited by CPD Digital certificate - Included Cademy certificate of completion Digital certificate - Included Will be downloadable when all lectures have been completed Certificate Accredited by CPD Hard copy certificate - £29 If you are an international student, then you have to pay an additional 10 GBP as an international delivery charge.

Risk Assessment Training - CPD Certified
Delivered Online On Demand2 hours 18 minutes
£12

Level 7 Advanced Diploma in IT Administrator - QLS Endorsed

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

Level 7 Advanced Diploma in IT Administrator - QLS Endorsed
Delivered Online On Demand3 weeks
£100

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

Certified Wireless Security Professional (CWSP)

4.8(9)

By Skill Up

Wireless security is essential for any organization, but it can be complex to implement and manage. The CWSP course will give you the skills and knowledge to secure your wireless network from various threats.

Certified Wireless Security Professional (CWSP)
Delivered Online On Demand13 hours 32 minutes
£25

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Network Security on an Ubuntu Linux Server

By Compete High

🔒 Unlock the Power of Network Security on an Ubuntu Linux Server! 🔒 Are you ready to safeguard your digital fortress? Dive into the world of Network Security with our comprehensive online course tailored specifically for Ubuntu Linux Server users! 🛡️ What You'll Learn:     Master the fundamentals of network security protocols and practices. Implement robust firewall configurations on your Ubuntu Linux Server. Discover advanced encryption techniques to secure your data transmission. Harden your server against cyber threats and unauthorized access. Learn best practices for intrusion detection and prevention. Explore real-world scenarios and case studies for hands-on learning.   👨‍💻 Who Is This Course For? IT professionals seeking to enhance their network security skills. System administrators responsible for securing Ubuntu Linux Servers. Beginners eager to delve into the world of cybersecurity on Linux systems.   🚀 Why Choose Our Course? Expert-led tutorials designed for all skill levels. Practical demonstrations and step-by-step guidance. Access to a supportive online community and forums. Updated content reflecting the latest industry standards. Lifetime access to course materials for continuous learning.   🎓 Take control of your server's security and fortify your knowledge in Ubuntu Linux network security! Enroll now and fortify your digital defenses today! Course Curriculum Module 1- Secure an Ubuntu Linux Server from Hackers Today! Secure an Ubuntu Linux Server from Hackers Today! 00:00 Module 2- Choosing a server host and setup Choosing a server host and setup 00:00 Module 3- Accessing the Ubuntu Linux server with putty Accessing the Ubuntu Linux server with putty 00:00 Module 4- How to download Putty for Windows How to download Putty for Windows 00:00 Module 5- Using a password manager like LastPass Using a password manager like LastPass 00:00 Module 6- Changing the password with passwd Changing the password with passwd 00:00 Module 7- Adding a new user with adduser Adding a new user with adduser 00:00 Module 8- Signing in with the added user Signing in with the added user 00:00 Module 9- Usermod to give the user sudo or root privileges Usermod to give the user sudo or root privileges 00:00 Module 10- Verify sudo access on user Verify sudo access on user 00:00 Module 11- Key basic Linux commands cd pwd and ls Key basic Linux commands cd pwd and ls 00:00 Module 12- Updating with apt-get update Draft Lesson 00:00 Module 13- Installing nano text editor Installing nano text editor 00:00 Module 14- Updating sshd_config with nano to PermitRootLogin no Updating sshd_config with nano to PermitRootLogin no 00:00 Module 15- Changing the SSH port from 22 to another number Changing the SSH port from 22 to another number 00:00 Module 16- Setting up RSA login by generating keys with puttygen Setting up RSA login by generating keys with puttygen 00:00 Module 17- Disabling password logins and ipv6 listening Disabling password logins and ipv6 listening 00:00 Module 18- Locked out of server and have to start over! Locked out of server and have to start over! 00:00 Module 19- Back in with a fresh install! Back in with a fresh install! 00:00 Module 20- Installing fail2ban to block IPs from repeated failed logins Installing fail2ban to block IPs from repeated failed logins 00:00 Module 21- Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts 00:00 Module 22- Install and configure ntp to sync time Install and configure ntp to sync time 00:00 Module 23- Thank you very much for watching this complete Ubuntu Linux server security setup tutorial Thank you very much for watching this complete Ubuntu Linux server security setup tutorial 00:00

Network Security on an Ubuntu Linux Server
Delivered Online On Demand1 hour 20 minutes
£4.99

Complete Python Course - Beginner to Expert

5.0(1)

By Course Gate

Unlock your potential in Python programming with our Complete Python Course - Beginner to Expert! From mastering syntax to advanced data analysis, machine learning, and web development, this comprehensive course equips you with essential programming skills. Start your journey today and become a proficient Python developer!

Complete Python Course - Beginner to Expert
Delivered Online On Demand15 hours 25 minutes
£11.99

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1

4.8(9)

By Skill Up

Become a networking expert with Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training. Learn to build and manage networks of all sizes, from simple to complex.

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1
Delivered Online On Demand18 hours 23 minutes
£25

IT Support Training: 8 in 1 Premium Courses Bundle

By Compete High

IT support is the backbone of every modern workplace, handling everything from system glitches to data security concerns. This 8 in 1 IT Support Training Premium Bundle delivers a solid grounding in essential IT knowledge, covering cybersecurity, GDPR, and Microsoft Office tools like Word, Excel, Access, and Outlook. It’s tailored for those looking to improve technical understanding and boost their efficiency in digital environments. Alongside the technology, the course includes important regulation insights to help protect data and maintain ethical standards in any organisation. Whether you’re stepping into IT support or enhancing your current role, this bundle equips you with skills to manage systems and information confidently and responsibly. Learning Outcomes Understand core IT principles and system support basics. Learn cybersecurity fundamentals to safeguard digital environments. Gain knowledge of GDPR for data protection awareness. Develop proficiency in Microsoft Word and document creation. Improve spreadsheet skills using Microsoft Excel tools. Explore email management and database basics in Outlook and Access. Who is this Course For Aspiring IT support technicians entering the technology sector. Office staff managing IT-related tasks and communications. Data handlers responsible for maintaining privacy and GDPR rules. IT administrators improving Microsoft Office proficiency. Professionals supporting cybersecurity measures in organisations. Remote workers managing digital files and emails efficiently. Career changers interested in foundational IT and security skills. Helpdesk and technical support staff seeking online training. Career Path IT Support Technician – £22,000 to £30,000 per year Cybersecurity Analyst (Entry level) – £28,000 to £38,000 per year Data Protection Officer – £30,000 to £40,000 per year Microsoft Office Specialist – £24,000 to £32,000 per year Helpdesk Analyst – £22,000 to £29,000 per year IT Administrator – £25,000 to £33,000 per year

IT Support Training: 8 in 1 Premium Courses Bundle
Delivered Online On Demand16 hours
£28.99

Microsoft Office Skills (MS Excel, Word, PowerPoint, Access), Administration & IT Training

4.8(9)

By Skill Up

All-in-one Package| CPD Certified| 35 Courses Training| 350 CPD Points| Free PDF+ Transcript Certificate| Lifetime Access

Microsoft Office Skills (MS Excel, Word, PowerPoint, Access), Administration & IT Training
Delivered Online On Demand8 days
£120