• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

927 Courses

Network Hacking Training

5.0(1)

By Course Gate

The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.  By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. Who is this course for? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Network Hacking Training
Delivered Online On Demand5 hours 2 minutes
£11.99

Cyber Crime Training for Law Enforcement/Fire/Security

By Compliance Central

Cyber Crime Training for Law Enforcement/Fire/Security course is for those who want to advance in this field. Throughout this course, you will learn the essential skills and gain the knowledge needed to become well versed in Cyber Crime Training for Law Enforcement/Fire/Security. Our course starts with the basics of Cyber Crime Training for Law Enforcement/Fire/Security and gradually progresses towards advanced topics. Therefore, each lesson of this Cyber Crime Training for Law Enforcement/Fire/Security is intuitive and easy to understand. So, stand out in the job market by completing the Cyber Crime Training for Law Enforcement/Fire/Security course. Get an accredited certificate and add it to your resume to impress your employers. Along with the Cyber Crime Training for Law Enforcement/Fire/Security course, you also get: Lifetime Access Unlimited Retake Exam & Tutor Support Easy Accessibility to the Course Materials- Anytime, Anywhere - From Any Smart Device (Laptop, Tablet, Smartphone Etc.) 100% Learning Satisfaction Guarantee Learn at your own pace from the comfort of your home, as the rich learning materials of this course are accessible from any place at any time. The curriculums are divided into tiny bite-sized modules by industry specialists. And you will get answers to all your queries from our experts. So, enrol and excel in your career with Compliance Central. Who is this course for? Anyone from any background can enrol in this Cyber Crime Training for Law Enforcement/Fire/Security course. Requirements To enrol in this Cyber Crime Training for Law Enforcement/Fire/Security course, all you need is a basic understanding of the English Language and an internet connection. Career path After completing this course, you can explore trendy and in-demand jobs related to Cyber Crime Training for Law Enforcement/Fire/Security. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Cyber Crime Training for Law Enforcement/Fire/Security
Delivered Online On Demand1 hour
£12

IT Security Basics

By St. Paul's College

This IT Security Basics course provides a scientific approach to safeguarding information, delving into the core principles that protect our digital infrastructure. Equip yourself with the knowledge to defend against cyber threats and secure sensitive data.

IT Security Basics
Delivered Online On Demand2 hours
£11.99

Computer Networks Security

5.0(10)

By Apex Learning

Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00

Computer Networks Security
Delivered Online On Demand8 hours 8 minutes
£12

Overview of Ecommerce Security Join our Ecommerce Security course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Ecommerce Security course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Ecommerce Security course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This Ecommerce Security Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Ecommerce Security. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Ecommerce Security course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Ecommerce Security is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Ecommerce Security course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Ecommerce Security Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Frequently Asked Questions (FAQ's) Q. How do I purchase a course? 1. You need to find the right course on our IOMH website at first. You can search for any course or find the course from the Courses section of our website. 2. Click on Take This Course button, and you will be directed to the Cart page. 3. You can update the course quantity and also remove any unwanted items in the CART and after that click on the Checkout option and enter your billing details. 4. Once the payment is made, you will receive an email with the login credentials, and you can start learning after logging into the portal. Q. I have purchased the course when will I be able to access the materials? After purchasing the course, you should receive an email with the login credentials within 24 hours. Please check your spam or junk folder if you didn't receive it in your inbox. You can access your courses by logging into your account. If you still need any assistance, please get in touch with our Customer Support team by providing the details of your purchase. Q. I haven't received my certificate yet. What should I do? You should receive your Digital Certificate within 24 hours after placing the order, and it will take 3-9 days to deliver the hard copies to your address if you are in the UK. For International Delivery, it will take 20-25 days. If you require any assistance, get in touch with our dedicated Customer Support team, and your queries/issues will be dealt with accordingly. Q. I don't have a credit/debit card, what other methods of payment do you accept? You can make the payment using PayPal or you can Bank Transfer the amount. For Bank transfer you will require an invoice from us and you need to contact our Customer Support team and provide details of your purchase to get the invoice. After that, you will receive an email with the invoice and bank details and you can make the payment accordingly. Q. Can I do the courses from outside UK? We are an online course provider, and learners from anywhere in the world can enrol on our courses using an internet-connected device. Q. When I log into the account it says 'Contact Administrator'. To resolve this issue, please log out of your account and then log back in. Course Curriculum Ecommerce Security Unit 1: Introduction and Types of Ecommerce 00:05:00 Unit 2: Ecommerce SEO 00:07:00 Unit 3: Ecommerce Demo 00:16:00 Unit 4: Ecommerce Website Vulnerability and Security Risk Scanning 00:33:00 Unit 5: Basic Terms of Ecommerce 00:08:00 Unit 6: Ecommerce Fraud 00:13:00 Unit 7: Ecommerce Fraud Prevention 00:07:00

Ecommerce Security
Delivered Online On Demand1 hour 29 minutes
£11.99

Web Application Penetration Testing and Security

By IOMH - Institute of Mental Health

Overview This Web Application Penetration Testing and Security course will unlock your full potential and will show you how to excel in a career in Web Application Penetration Testing and Security. So upskill now and reach your full potential. Everything you need to get started in Web Application Penetration Testing and Security is available in this course. Learning and progressing are the hallmarks of personal development. This Web Application Penetration Testing and Security will quickly teach you the must-have skills needed to start in the relevant industry. In This Web Application Penetration Testing and Security Course, You Will: Learn strategies to boost your workplace efficiency. Hone your Web Application Penetration Testing and Security skills to help you advance your career. Acquire a comprehensive understanding of various Web Application Penetration Testing and Security topics and tips from industry experts. Learn in-demand Web Application Penetration Testing and Security skills that are in high demand among UK employers, which will help you to kickstart your career. This Web Application Penetration Testing and Security course covers everything you must know to stand against the tough competition in the Web Application Penetration Testing and Security field.  The future is truly yours to seize with this Web Application Penetration Testing and Security. Enrol today and complete the course to achieve a Web Application Penetration Testing and Security certificate that can change your professional career forever. Additional Perks of Buying a Course From Institute of Mental Health Study online - whenever and wherever you want. One-to-one support from a dedicated tutor throughout your course. Certificate immediately upon course completion 100% Money back guarantee Exclusive discounts on your next course purchase from Institute of Mental Health Enrolling in the Web Application Penetration Testing and Security course can assist you in getting into your desired career quicker than you ever imagined. So without further ado, start now. Process of Evaluation After studying the Web Application Penetration Testing and Security course, your skills and knowledge will be tested with a MCQ exam or assignment. You must get a score of 60% to pass the test and get your certificate.  Certificate of Achievement Upon successfully completing the Web Application Penetration Testing and Security course, you will get your CPD accredited digital certificate immediately. And you can also claim the hardcopy certificate completely free of charge. All you have to do is pay a shipping charge of just £3.99. Who Is This Course for? This Web Application Penetration Testing and Security is suitable for anyone aspiring to start a career in Web Application Penetration Testing and Security; even if you are new to this and have no prior knowledge on Web Application Penetration Testing and Security, this course is going to be very easy for you to understand.  And if you are already working in the Web Application Penetration Testing and Security field, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  Taking this Web Application Penetration Testing and Security course is a win-win for you in all aspects.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements This Web Application Penetration Testing and Security course has no prerequisite.  You don't need any educational qualification or experience to enrol in the Web Application Penetration Testing and Security course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online Web Application Penetration Testing and Security course. Moreover, this course allows you to learn at your own pace while developing transferable and marketable skills. Course Curriculum Unit 01: Introduction About The Course 00:03:00 Unit 02: BE PREPARED Web Attack Simulation Lab 00:12:00 Unit 03: WEB APPLICATION TECHNOLOGIES Web application technologies 101 - PDF 00:00:00 HTTP Protocol Basics 00:11:00 Encoding Schemes 00:13:00 Same Origin Policy - SOP 00:06:00 HTTP Cookies 00:11:00 Cross-origin resource sharing 00:05:00 Web application proxy - Burp suite 00:09:00 Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Fingerprinting web server 00:05:00 DNS Analysis - Enumerating subdomains 00:04:00 Metasploit for web application attacks 00:12:00 Web technologies analysis in real time 00:03:00 Outdated web application to server takeover 00:08:00 BruteForcing Web applications 00:06:00 Shodan HQ 00:07:00 Harvesting the data 00:05:00 Finding link of target with Maltego CE 00:09:00 Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Cross Site Scripting- XSS - PDF 01:08:00 Cross site scripting 00:07:00 Reflected XSS 00:14:00 Persistent XSS 00:11:00 DOM-based XSS 00:10:00 Website defacement through XSS 00:09:00 XML Documents & database 00:14:00 Generating XSS attack payloads 00:13:00 XSS in PHP, ASP & JS Code review 00:13:00 Cookie stealing through XSS 00:12:00 Advanced XSS phishing attacks 00:08:00 Advanced XSS with BeEF attacks 00:10:00 Advanced XSS attacks with Burp suite 00:08:00 Code Review Guide 06:20:00 Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS SQL Injection attacks - PDF 01:30:00 Introduction to SQL Injection 00:16:00 Dangers of SQL Injection 00:05:00 Hunting for SQL Injection vulnerabilities 00:20:00 In-band SQL Injection attacks 00:27:00 Blind SQL Injection attack in-action 00:10:00 Exploiting SQL injection - SQLMap 00:09:00 Fuzzing for SQL Injection - Burp Intruder 00:14:00 Unit 07: CROSS SITE REQUEST FORGERY - XSRF CSRF or XSRF attack methods 00:12:00 Anti-CSRF Token methods 00:15:00 Anti-CSRF token stealing-NOT easy 00:11:00 Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Authentication bypass-hydra 00:11:00 HTTP Verb Tampering 00:09:00 HTTP parameter pollution - HPP 00:06:00 Authentication 00:10:00 Unit 09: CLIENT SIDE SECURITY TESTING Client side control bypass 00:10:00 Unit 10: FILE RELATED VULNERABILITIES LFI & RFI attacks 00:13:00 Unrestricted file upload - content type 00:06:00 Unrestricted File Upload - Extension Type 00:06:00 Remote code execution using Shell Uploads 00:09:00 Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE XML Documents & database 00:14:00 XXE attacks in action 00:14:00

Web Application Penetration Testing and Security
Delivered Online On Demand17 hours 23 minutes
£11.99

Ethical RFID Hacking

By St. Paul's College

This course begins with a comprehensive introduction to RFID technology, focusing on both low and high-frequency cards. You'll explore the Proxmark3 RDV4 device, a powerful RFID testing tool, learning its installation and implementation to understand how RFID systems can be ethically analysed and tested.

Ethical RFID Hacking
Delivered Online On Demand50 minutes
£11.99

Security Officer Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

Security Officer Training
Delivered Online On Demand4 hours 41 minutes
£25

Security Threat Management

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

Security Threat Management
Delivered Online On Demand4 hours 59 minutes
£25

Web Application Penetration Testing Course

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 38 minutes
£25