• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

22121 Courses

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Email Marketing - Reach Your Customer

By Compliance Central

Are you looking to enhance your Email Marketing skills? If yes, then you have come to the right place. Our comprehensive course on Email Marketing will assist you in producing the best possible outcome by mastering the Email Marketing skills. The Email Marketing course is for those who want to be successful. In the Email Marketing course, you will learn the essential knowledge needed to become well versed in Email Marketing. Our course starts with the basics of Email Marketing and gradually progresses towards advanced topics. Therefore, each lesson of this Email Marketing course is intuitive and easy to understand. Why would you choose the Email Marketing course from Compliance Central: Lifetime access to Email Marketing course materials Full tutor support is available from Monday to Friday with the Email Marketing course Learn Email Marketing skills at your own pace from the comfort of your home Gain a complete understanding of Email Marketing course Accessible, informative Email Marketing learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the Email Marketing Study Email Marketing in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your Email Marketing Course Curriculum Breakdown of the Email Marketing Course Module 01: Introduction Module 02: Entrepreneur Mindset Masterclass How to Start and Grow an Email List Module 03: Creating Email Lists Module 04: Email Automation Module 05: Email Copywriting Module 06: Email Deliverability Module 07: The Concepts of Email Marketing Module 08: Using Capture Pages and Funnels for Leads Module 09: Conclusion CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Email Marketing course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Email Marketing. It is also great for professionals who are already working in Email Marketing and want to get promoted at work. Requirements To enrol in this Email Marketing course, all you need is a basic understanding of the English Language and an internet connection. Career path The Email Marketing course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Email Marketing. Email Marketing Specialist: £25,000 to £40,000 per year Digital Marketing Coordinator: £20,000 to £35,000 per year Marketing Automation Specialist: £28,000 to £45,000 per year E-commerce Marketing Manager: £35,000 to £55,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Email Marketing - Reach Your Customer
Delivered Online On Demand10 hours
£12

Microblading Training | Fundamental Beginners PMU Training -Small Group Learning

By ID Liner | Permanent Makeup Training & Supplies

MICROBLADING HAS BECOME ONE OF THE BIGGEST BEAUTY TRENDS AND THIS MICROBLADING TRAINING COURSE IS IDEAL FOR STUDENTS THAT WANT TO SPECIALISE SOLELY IN MICROBLADED BROWS.

Microblading Training | Fundamental Beginners PMU Training -Small Group Learning
Delivered Online & In-PersonFlexible Dates
£2,495

NASM Certified Personal Trainer (CPT)

5.0(13)

By Platinum Training Institute

For over 30 years, the National Academy of Sports Medicine has developed the most successful personal trainers in the fitness industry. The NCCA-accredited personal trainer certification provides you with the most scientifically accurate information, all delivered in a revolutionary digital learning platform. If you want to become one of the best, most respected, and highest-paid fitness trainers, it’s as simple as getting certified online with NASM.

NASM Certified Personal Trainer (CPT)
Delivered Online On Demand
£50 to £2,300

Online Professional Photography Course

4.8(9)

By Skill Up

Capture your passion with our Professional Photography Course. Master camera techniques, editing skills, & creative concepts. Start snapping stunning shots today.

Online Professional Photography Course
Delivered Online On Demand20 hours 30 minutes
£25

HTML Email Creation from Scratch

4.8(9)

By Skill Up

Gain efficiency on HTML & boost up your skill with the HTML Email Creation from Scratch. This HTML

HTML Email Creation from Scratch
Delivered Online On Demand1 hour 40 minutes
£25

Essential Broadband access for engineers

5.0(3)

By Systems & Network Training

Broadband access training course description ADSL is a broadband technology providing fast Internet access (amongst other applications) over existing telephone lines. This course covers an overview of the DSL family, what ADSL is through to how ADSL works. What will you learn Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture. Recognise the limitations of ADSL. List the elements required for an ADSL installation. Broadband access training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data communications & networking Duration 2 days Broadband access training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, Layer 4 and above, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards

Essential Broadband access for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Bust Digital Workshop (elf/pixie/fairy/punk)

5.0(71)

By Green Man Ceramics

This is a step by step digital workshop that will be sent directly to your inbox for you to keep forever. All my workshops are suitable for beginners and the more experienced artist. I have 25 years experience delivering workshops to all ages and abilities. I use raku sculpture clay and finish with oxides but any clay can be used including air dry clay for people who do not have a kiln. I am happy to answer any questions via my facebook page or here.

Bust Digital Workshop (elf/pixie/fairy/punk)
Delivered Online On Demand
£65 to £35.00

Copywriting Skills - Level 4

4.8(9)

By Skill Up

Master persuasive writing techniques. Craft compelling headlines. Use power words. Enhance storytelling. Boost conversions. Perfect your copywriting skills.

Copywriting Skills - Level 4
Delivered Online On Demand4 hours 23 minutes
£13.99

Total ADSL

5.0(3)

By Systems & Network Training

ADSL training course description An introduction to ATM. What will you learn Recognise the benefits of ADSL. Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture Recognise the limitations of ADSL. List the elements required for an ADSL installation. ADSL training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data comms & networking Duration 2 days ADSL training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, layer 4 and above, ADSL and IP, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards.

Total ADSL
Delivered in Internationally or OnlineFlexible Dates
£2,477