• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1047 Courses

Full Stack Web Developer Job Ready Program with Career Support & Money Back Guarantee

4.7(47)

By Academy for Health and Fitness

"Start your career as a Full Stack Web Developer and earn up to £70,000 per month." Did you know? The UK digital sector is booming, with over 2 million job openings expected by 2025! Full stack web developers are in high demand, earning an average salary of £50,000, with top earners exceeding £100,000. Are you ready to join this exciting field and build the websites and applications of tomorrow? Our Full Stack Web Developer Job Ready Program is your all-in-one solution to learn web development from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job in web development. By choosing our Full Stack Web Developer Job Ready Program, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from Training to Employment. Enrol Now and Kickstart Your Full Stack Web Development Career. Don't miss this opportunity to transform your career with the Full Stack Web Developer Job Ready Program. With our comprehensive training, career support, and money-back guarantee, you're not just enrolling in a program; you're investing in a brighter future. Join us now and become a part of the next generation of Full Stack Web Developer! In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Full Stack Web Developer, so we can help you get the job you want. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Full Stack Web Developer Job Ready Program today and start your journey to becoming a successful Full Stack Web Developer! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Full Stack Web Developer Job Ready Program: Personalised Guidance: Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some experience, we will guide you towards honing your skills and developing a strong foundation in Full Stack Web Development. One-On-One Consultation Sessions with Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Full Stack Web Developer field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Full Stack Web Developers. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Our aim is to maximise your employment prospects and provide you with a range of exciting opportunities to choose from. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 100% money-back guarantee. Courses we will provide once you enrol in the program: Course 01: Diploma in Complete Web Development at QLS Level 5 Course 02: HTML Web Development Crash Course Course 03: Fundamentals of CSS Course 04: CSS Web Development Crash Course Course 05: Learn Web Development from Scratch Course 06: Ultimate PHP & MySQL Web Development Course & OOP Coding Course 07: Ionic & Angular JS: Mobile and Web Development Course 08: SQL for Data Science, Data Analytics and Data Visualization Course 09: MySql Masterclass Course 40: Basics of WordPress: Create Unlimited Websites Course 11: Masterclass Bootstrap 5 Course - Responsive Web Design Course 12: Diploma in User Experience UI/UX Design (Advanced) Course 13: CSS - Responsive Design Course 14: PHP Webforms for Everyone Course 15: Cyber Security Advanced Training The Full Stack Web Developer Job Ready Program with Career Support & Money Back Guarantee is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Full Stack Web Developer Job Ready Program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 15 premium courses related to Full Stack Web Development. These courses will teach you the knowledge and skills required to become a successful Full Stack Web Developer. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the Full Stack Web Development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in web development, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful Full Stack Web Developer career begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Full Stack Web Developer Job Ready Program is perfect for: Beginners eager to break into the field of Full Stack Web Development and get a job. Professionals looking to move their career towards data science. Individuals seeking a comprehensive understanding of data analysis tools and techniques. Those aiming for a career upgrade with advanced analytics skills. Anyone interested in gaining practical, job-ready skills in Full Stack Web Development. Requirements No experience required. Just enrol & start learning. Career path This Full Stack Web Developer Job Ready Program will help you get a job in different roles, such as: Junior Web Developer: £25,000 - £35,000+ Web Developer: £35,000 - £50,000+ Senior Web Developer: £50,000 - £70,000+ Full Stack Developer: £50,000 - £100,000+ Front-End Developer: £40,000 - £60,000+ Back-End Developer: £45,000 - £75,000+ Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Full Stack Web Developer Job Ready Program with Career Support & Money Back Guarantee
Delivered Online On Demand3 hours
£699

Cloud (AWS, Azure, Google) Architect Job Ready Program with Money Back Guarantee

4.7(47)

By Academy for Health and Fitness

"Start your career as an AWS Cloud Architect and earn up to £70,000 Per Year." Dreaming of a high-paying career in the booming tech industry? Look no further than Cloud Architecture! The UK cloud computing market is expected to reach a staggering £172 billion by 2025, creating a surge in demand for skilled professionals. Salaries for AWS Cloud Architects average a lucrative £65,000, and the best part? You can launch your career without a formal degree. So, are you ready to take control of your future? Our AWS Cloud Architect Job Ready Program is your all-in-one solution to learn cloud computing from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job in cloud computing. By choosing our AWS Cloud Architect Job Ready Program, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from Training to Employment. Enrol Now and Kickstart Your AWS Cloud Architect Career. Don't miss this opportunity to transform your career with the AWS Cloud Architect Job Ready Program. With our comprehensive training, career support, and money-back guarantee, you're not just enrolling in a program; you're investing in a brighter future. Join us now and become a part of the next generation of AWS Cloud Architect! In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring AWS Cloud Architect, so we can help you get the job you want. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our AWS Cloud Architect Job Ready Program today and start your journey to becoming a successful AWS Cloud Architect! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our AWS Cloud Architect Job Ready Program: Personalised Guidance: Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some experience, we will guide you towards honing your skills and developing a strong foundation in cloud computing. One-On-One Consultation Sessions with Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the cloud computing field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking AWS Cloud Architects. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Our aim is to maximise your employment prospects and provide you with a range of exciting opportunities to choose from. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 100% money-back guarantee. Courses we will provide once you enrol in the program: Course 01: Online AWS Certified Database Specialty Exam Preparation (DBS-C01) Course 02: AWS Essentials Online Course Course 03: AWS Certified Solutions Architect Associate Course 04: Microsoft Azure Cloud Concepts Course 05: Azure Administrator Essentials Course 06: Fundamentals of Azure Virtual Desktop Course 07: Learn Azure AD PowerShell for M365 Course 08: Azure Masterclass Course 09: Azure Machine Learning Course 10: Google Cloud for Beginners Course 11: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 12: CompTIA Network (N10-007) Course 13: CompTIA Security+ (SY0-601) Course 14: Introduction to Virtual Apps and Virtual Desktop Solution Course 15: Cryptography Course 16: Business and Data Analytics for Beginners Course 17: Python from Scratch Course 18: Coding Essentials - Javascript, ASP. Net, C# - Bonus HTML Course 19: Practical Project Management Course 20: Cyber Security Advanced Training The AWS Cloud Architect Job Ready Program with Career Support & Money Back Guarantee is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the AWS Cloud Architect Job Ready Program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 20 premium courses related to cloud computing. These courses will teach you the knowledge and skills required to become a successful AWS Cloud Architect. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the cloud computing industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in cloud computing, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful AWS Cloud Architect career begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This AWS Cloud Architect Job Ready Program is perfect for: Beginners eager to break into the field of cloud computing and get a job. Professionals looking to move their career towards data science. Individuals seeking a comprehensive understanding of data analysis tools and techniques. Those aiming for a career upgrade with advanced analytics skills. Anyone interested in gaining practical, job-ready skills in Cloud Architecture. Requirements No experience is required. Just enrol & start learning. Career path This AWS Cloud Architect Job Ready Program will help you get a job in different roles, such as: Cloud Architect: £65,000+ Cloud Engineer: £55,000+ DevOps Engineer: £50,000+ Solutions Architect: £70,000+ Cloud Security Engineer: £60,000+ Data Architect: £62,000+ Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Cloud (AWS, Azure, Google) Architect Job Ready Program with Money Back Guarantee
Delivered Online On Demand3 hours
£699

AI and the Digital Ecosystem - BCS Foundation Award

5.0(12)

By Duco Digital Training

This award introduces the critical concepts associated with AI and explores its relationship with the systems and processes that make up the digital ecosystem. It explores how AI can empower organisations to utilise Big Data through the use of Business Analysis and Machine Learning, and encourages candidates to consider a future vision of the world that is powered by AI.

AI and the Digital Ecosystem - BCS Foundation Award
Delivered OnlineFlexible Dates
£550

IT Support Analyst Mini Bundle

By Compete High

If you're aiming to enter—or move up in—the tech support and systems analysis field, the IT Support Analyst Mini Bundle delivers. Designed to align with today's hybrid business models, this career bundle equips you with the must-have combination of IT, Basic Electrical Engineering, Project Management, Crisis Management, and Cyber Security. Ideal for analyst roles in corporate, public sector, and IT services environments, this bundle makes sure your profile rises above the stack of applications—and lands in the interview pile. Description Companies are searching for candidates who are comfortable in both technical and analytical roles. The IT Support Analyst Mini Bundle does exactly that. It blends IT competence with critical operational skills like Project Management, Crisis Management, and Cyber Security, backed by a solid understanding of Basic Electrical Engineering. This combination gives hiring managers everything they need to see: you’re not just tech-savvy—you’re crisis-ready, project-aware, and trained in Cyber Security protocols. You understand systems at the technical level (IT, Basic Electrical Engineering), but you also speak the language of business continuity and analysis. Don’t wait until these job listings close. Employers want professionals fluent in IT, Project Management, Cyber Security, Crisis Management, and Basic Electrical Engineering—and this bundle gives you all five. You’re not just employable—you’re exactly what they need. FAQ Q: What job roles can this help me qualify for? A: IT support analyst, junior systems analyst, project support officer, and compliance tech roles requiring IT, Cyber Security, Project Management, Crisis Management, and Basic Electrical Engineering. Q: Is this bundle useful for project-based support roles? A: Yes. Project Management and Crisis Management make you valuable beyond day-to-day IT tasks. Q: Why is Basic Electrical Engineering included? A: It strengthens your hands-on understanding of IT infrastructure and hardware analysis. Q: Is Crisis Management relevant in IT? A: Absolutely. Crisis Management is key for analysts dealing with outages, breaches, and recovery scenarios. Q: Can I move into compliance or risk-based roles with this? A: Definitely. Cyber Security and Project Management are high-demand skills for such paths. Q: Is this more affordable than buying each course separately? A: Yes. You gain full access to IT, Cyber Security, Crisis Management, Project Management, and Basic Electrical Engineering—all bundled for exceptional value.

IT Support Analyst Mini Bundle
Delivered Online On Demand11 hours
£19.99

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

Collaborating with Business Teams - BCS Course

5.0(12)

By Duco Digital Training

This Level 4 course encourages individuals in digital and technical roles to enhance their skills by exploring different techniques, formats, and tools to communicate and understand the impact of their communication choices.

Collaborating with Business Teams - BCS Course
Delivered OnlineFlexible Dates
£625

BCS Foundation Certificate in Agile

5.0(12)

By Duco Digital Training

The course is relevant to anyone requiring an understanding of the use of Agile or looking to adopt it. This includes, but is not limited to, organisational leaders and managers, marketing executives and managers, and/or all professionals working in an Agile environment, including software sesters, developers, business analysts, UX designers, project management office (PMO), project support and project coordinators.

BCS Foundation Certificate in Agile
Delivered OnlineFlexible Dates
£850

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered OnlineFlexible Dates
£2,085

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995