• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5000 Courses

IT: Programming, Web Development, Networking & Security Complete Training

4.9(27)

By Apex Learning

Are you interested in becoming a well-rounded IT professional? Our "IT: Programming, Web Development, Networking & Security Complete Training" bundle is the perfect choice for you! This bundle package consists of 30 premium courses, carefully curated to provide you with a comprehensive understanding of various IT domains. From web development to networking and security, this bundle has got you covered. Get experience with essential IT skills, including Python, SQL, JavaScript, C#, and more. Our courses are designed to equip you with the knowledge and skills required to succeed in your IT career. You will also learn about data protection, ethical hacking, and cybersecurity through our specialized courses. Our bundle includes a course on GDPR, a crucial compliance regulation, and ethical hacking with Kali Linux. In addition to technical skills, we also offer career-focused courses, including career development plan fundamentals, CV writing, job searching, and interview skills. You will also learn how to create a professional LinkedIn profile to boost your job search. Invest in your career and enroll in our "IT: Programming, Web Development, Networking & Security Complete Training" bundle. With our expert-led courses and career-focused modules, you will gain a competitive edge in the IT industry. Start your journey today! This All About IT Bundle consists of the following premium courses: Course 01: IT Support Technician Course 02: Network Security and Risk Management Course 03: CompTIA Network Course 04: Information Management Course 05: Web Application Penetration Testing Course Course 06: CompTIA Cloud+ (CV0-002) Course 07: PLC Programming Diploma Course 08: Coding with Scratch Course 09: Create Your First Responsive Website Course 10: Python Course Course 11: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 12: SQL For Data Analytics & Database Development Course 13: C# (C-Sharp) Course 14: Computer Operating System and Troubleshooting Course 15: MS Word Essentials - The Complete Word Course - Level 3 Course 16: Building Your Own Computer Course Course 17: ASP.Net MVC and Entity Framework Course Course 18: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 19: Learn Ethical Hacking with Kali Linux Course 20: SQL Database Administrator Course 21: JavaScript Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Data Science and Visualisation with Machine Learning Course 24: Cisco ASA Firewall Training Course Course 25: Data Protection (GDPR) Practitioner Moreover, this bundles include 5 career-focused courses: Course 01: Career Development Plan Fundamentals Course 02: CV Writing and Job Searching Course 03: Interview Skills: Ace the Interview Course 04: Video Job Interview for Job Seekers Course 05: Create a Professional LinkedIn Profile Our cutting-edge learning package offers top-notch digital aid and first-rate tutor support. You will acquire the crucial hard and soft skills needed for career advancement because this bundle has been thoroughly examined and is career-friendly. So don't overthink! Enrol today. Learning Outcomes This unique All About IT mega bundle will help you to- Quench your thirst for knowledge Be up-to-date about the latest advancements Achieve your dream career goal in this sector Know the applicable rules and regulations needed for a professional in this area Acquire some valuable knowledge related to All About IT to uplift your morale The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Certificate: PDF Certificate: Free for all 30 courses Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The All About IT bundle is designed to assist anyone with a curious mind, anyone looking to boost their CVs or individuals looking to upgrade their career to the next level can also benefit from the learning materials. Requirements The courses in this bundle has been designed to be fully compatible with tablets and smartphones. Career path This All About IT bundle will give you an edge over other competitors and will open the doors for you to a plethora of career opportunities. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (IT Support Technician) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT: Programming, Web Development, Networking & Security Complete Training
Delivered Online On Demand
£150

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

Security Management at QLS Level 5 Diploma - 12 Courses Bundle

By NextGen Learning

Are you looking to elevate your professional skills to new heights? Introducing our Diploma in Security Management at QLS Level 5, a QLS-endorsed course bundle that sets a new standard in online education. This prestigious endorsement by the Quality Licence Scheme (QLS) is a testament to the exceptional quality and rigour of our course content. The bundle comprises 11 CPD-accredited courses, each meticulously designed to meet the highest standards of learning. This endorsement not only highlights the excellence of our courses but also assures that your learning journey is recognised and valued in the professional world. The purpose of Diploma in Security Management at QLS Level 5 is to provide learners with a comprehensive, skill-enriching experience that caters to a variety of professional needs. Each course within the bundle is crafted to not only impart essential knowledge but also to enhance practical skills, ensuring that learners are well-equipped to excel in their respective fields. From gaining cutting-edge industry insights to mastering critical thinking and problem-solving techniques, this bundle is an amalgamation of learning experiences that are both enriching and empowering. Moreover, Diploma in Security Management at QLS Level 5 goes beyond just online learning. Upon completion of the bundle, learners will receive a free QLS Endorsed Hardcopy Certificate & 11 CPD Accredited PDF Certificate, a tangible acknowledgement of their dedication and hard work. This certificate serves as a powerful tool in showcasing your newly acquired skills and knowledge to potential employers. So, why wait? Embark on this transformative learning journey today and unlock your potential with Diploma in Security Management at QLS Level 5! QLS Endorsed Course: Course 01: Diploma in Security Management at QLS Level 5 CPD QS Accredited Courses: Course 02: CCTV Operator Course Course 03: Security Guard Course 04: Criminal Intelligence Analyst Course 05: Airport Management Course Course 06: Criminal Law Course 07: Lifeguard Training Course 08: Close Protection Course 09: Bodyguard Training Course 10: Extremism & Terrorism Awareness Course 11: Criminology & Profiling Course Course 12: Cyber Security Awareness Training Learning Outcomes Upon completion of the bundle, you will be able to: Acquire industry-relevant skills and up-to-date knowledge. Enhance critical thinking and problem-solving abilities. Gain a competitive edge in the job market with QLS-endorsed certification. Develop a comprehensive understanding of Security Management. Master practical application of theoretical concepts. Improve career prospects with CPD-accredited courses. The Diploma in Security Management at QLS Level 5 offers an unparalleled learning experience endorsed by the Quality Licence Scheme (QLS). This endorsement underlines the quality and depth of the courses, ensuring that your learning is recognised globally. The bundle includes 11 CPD-accredited courses, each meticulously designed to cater to your professional development needs. Whether you're looking to gain new skills, enhance existing ones, or pursue a complete career change, this bundle provides the tools and knowledge necessary to achieve your goals. The Quality Licence Scheme (QLS) endorsement further elevates your professional credibility, signalling to potential employers your commitment to excellence and continuous learning. The benefits of this course are manifold - from enhancing your resume with a QLS-endorsed certification to developing skills directly applicable to your job, positioning you for promotions, higher salary brackets, and a broader range of career opportunities. Embark on a journey of professional transformation with Diploma in Security Management at QLS Level 5 today and seize the opportunity to stand out in your career. Enrol in Security Management now and take the first step towards unlocking a world of potential and possibilities. Don't miss out on this chance to redefine your professional trajectory! Certificate of Achievement: QLS-endorsed courses are designed to provide learners with the skills and knowledge they need to succeed in their chosen field. The Quality Licence Scheme is a distinguished and respected accreditation in the UK, denoting exceptional quality and excellence. It carries significant weight among industry professionals and recruiters. Upon completion, learners will receive a Free Premium QLS Endorsed Hard Copy Certificate titled 'Diploma in Security Management at QLS Level 5' & 11 Free CPD Accredited PDF Certificates. These certificates serve to validate the completion of the course, the level achieved, and the QLS endorsement. Please Note: NextGen Learning is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Diploma in Security Management at QLS Level 5 bundle is ideal for: Professionals seeking to enhance their skills and knowledge. Individuals aiming for career advancement or transition. Those seeking CPD-accredited certification for professional growth. Learners desiring a QLS-endorsed comprehensive learning experience. Requirements You are cordially invited to enroll in this bundle; please note that there are no formal prerequisites or qualifications required. We've designed this curriculum to be accessible to all, irrespective of prior experience or educational background. Career path Upon completing the Diploma in Security Management at QLS Level 5 course bundle, each offering promising prospects and competitive salary ranges. Whether you aspire to climb the corporate ladder in a managerial role, delve into the dynamic world of marketing, explore the intricacies of finance, or excel in the ever-evolving field of technology. Certificates CPD Quality Standard Certificate Digital certificate - Included Free 11 CPD Accredited PDF Certificates. QLS Endorsed Certificate Hard copy certificate - Included

Security Management at QLS Level 5 Diploma - 12 Courses Bundle
Delivered Online On Demand5 days
£49

CCES Check Point Certified Endpoint Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCES Check Point Certified Endpoint Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

CNSE-Azure Check Point Network Security Expert for Azure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke cloud security environment. Describe the function of the Cloud Management Extension Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in Azure. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in Azure. Describe the workflow for configuring scaling solutions in Azure. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in Azure. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in Azure. Explain the steps required for troubleshooting Scaling Solution issues in Azure. Describe the steps required for troubleshooting clusters in Azure. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Deploy a Security Management Server. Connect to SmartConsole. Configure Azure Active Directory and the Service Principle. Install the Cloud Management Extension. Configure the Cloud Management Extension. Configure the Access Control Policy. Assign the Service Principle. Create the CloudGuard Controller Object. Configure Access Control Policy with a Data Center Object. Deploy the Spoke vNets. Create the Spoke Route Table. Deploy Web Servers into the Spoke vNets. Deploy the Virtual Machine Scale Set. Assign the Service Principle to the VMSS Resource Group. Enable Indentity Awareness on the VMSS. Create Load Balancer Rules. Create vNet Peers. Create Web Server Access Control policy. Deploy the Azure High Availability Solution. Create the Cluster Object. Configure the vNet Peering. Create the Internal User Defined Routes. Create the Security Policy for Internal Traffic. Test the Internal Traffic. Troubleshoot the CloudGuard Controller. Debugs the CloudGuard Controller. Debug the Cloud Management Extension. Additional course details: Nexus Humans CNSE-Azure Check Point Network Security Expert for Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-Azure Check Point Network Security Expert for Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNSE-Azure Check Point Network Security Expert for Azure
Delivered OnlineFlexible Dates
Price on Enquiry

The Ultimate Guide to Event Planning - 1 Day Workshop in Bracknell

By Mangates

Event Planning 1 Day Training in Bracknell

The Ultimate Guide to Event Planning - 1 Day Workshop in Bracknell
Delivered In-Person + more
£595 to £795

The Complete Ethical Hacking Course

4.7(160)

By Janets

Register on the The Complete Ethical Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The The Complete Ethical Hacking Course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The The Complete Ethical Hacking Course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the The Complete Ethical Hacking Course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Introduction to Ethical Hacking What is an Ethical Hacker 00:07:00 Terminology Crash Course pt. 1 00:09:00 Terminology Crash Course pt. 2 00:14:00 Terminology Crash Course pt. 3 00:08:00 Legal Considerations 00:11:00 Reconnaissance - Surveying the Attack Surface Surveying the Attack Surface 00:10:00 Recon Types 00:08:00 Passive Recon Part 1 00:07:00 Passive Recon Part 2 00:10:00 Active Recon 00:15:00 Recon Walkthrough Tools Summary 00:14:00 Maltego Demo 00:07:00 FOCA Demo 00:05:00 DEMO - Harvester 00:02:00 Scanning and Enumeration - Getting Down to Business Scanning & enumeration 00:08:00 Identifying Active Hosts pt. 1 00:10:00 Identifying Active Hosts pt. 2 00:13:00 Identifying Active Services 00:18:00 OS and Services Fingerprinting 00:15:00 Network Mapping 00:10:00 Final Thoughts 00:05:00 DEMO - Nmap Syntax pt. 1 00:14:00 DEMO - Nmap Syntax pt. 2 00:16:00 DEMO - Nmap Hosts Discovery 00:12:00 DEMO - Nmap Service Discovery 00:17:00 DEMO - Nmap Scripts 00:11:00 DEMO - Masscan 00:11:00 Network Presence Network Insecurity 00:04:00 Sniffing and Spoofing 00:13:00 Sniffing Tools 00:09:00 Spoofing, Crypto and Wifi 00:15:00 DEMO - tcpdump 00:11:00 DEMO - Wireshark 00:11:00 DEMO - Ettercap 00:13:00 DEMO - Burp Suite 00:15:00 DEMO - Scapy 00:10:00 Attacking Security Overview pt. 1: Windows Architecture 00:18:00 Security Overview pt. 2: Credentials Security 00:16:00 Security Overview pt. 3: Memory Corruption and Exploitation 00:16:00 Windows Hacking Basics 00:20:00 Local Access and Privilege Escalation 00:20:00 Dumping Hashes and Cracking Passwords 00:18:00 Linux Attacking Basics pt. 1 00:13:00 Linux Attacking Basics pt. 2 00:14:00 References 00:08:00 DEMO - Windows MSF Exploit pt. 1 00:13:00 DEMO - Windows MSF Exploit pt. 2 00:15:00 DEMO - Post Exploitation Activities 00:13:00 DEMO - Mimikatz 00:07:00 DEMO - Hashcat 00:08:00 DEMO - Konboot 00:13:00 DEMO - Post Exploitation Windows CMD 00:14:00 DEMO - Post Exploitation Windows Powershell 00:13:00 DEMO - Attacking Linux targets pt. 1aa 00:10:00 DEMO - Attacking Linux targets pt. 1 00:13:00 Web Hacking Introduction to Web Hacking 00:03:00 Web Security Architecture Overview pt. 1 00:17:00 Web Security Architecture Overview pt. 2 00:12:00 Attacking the Web Server pt. 1 00:10:00 Attacking the Web Server pt. 2 00:11:00 Attacking the Platform pt. 1 00:19:00 Attacking the Platform pt. 2 00:08:00 Attacking the Technology pt. 1 00:21:00 Attacking the Technology pt. 2 00:17:00 OWASP Top 10 pt. 1 00:09:00 OWASP Top 10 pt. 2 00:21:00 Attacking the Business Logic pt. 1 00:11:00 Attacking the Business Logic pt. 2 00:15:00 Tools and Methodology 00:20:00 References 00:05:00 DEMO - OWASP Mutillidae 00:09:00 SQLI 00:07:00 SQL Map Intro 00:08:00 SQL Map 00:25:00 DEMO - Burpsuite 00:37:00 DEMO - Burpsuite XSS Hunter 00:16:00 DEMO - mitmproxy 00:10:00 DEMO - Skipfish pt.1 00:05:00 DEMO - Skipfish pt.2 00:05:00 Social Engineering - Hacking Humans Social Engineering Basics 00:15:00 Social Engineering Methods 00:16:00 Tools and Techniques pt. 1 00:15:00 Tools and Techniques pt. 2 00:12:00 Tools and Techniques pt. 3 00:09:00 Physical Security Considerations 00:13:00 Final Thoughts99 00:11:00 DEMO - Credential harvesting 00:02:00 DEMO - Website cloning 00:06:00 DEMO - Automating an attack 00:03:00 DEMO - Anti-virus evasion pt. 1 00:08:00 DEMO - Anti-virus evasion pt. 2 00:12:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

The Complete Ethical Hacking Course
Delivered Online On Demand18 hours 13 minutes
£25

Bodyguard Training - CPD Certified Course

By One Education

Stepping into the world of personal protection requires more than just a sharp suit and a stern look—it demands confidence, discretion, and the ability to anticipate trouble before it even crosses the street. Our Bodyguard Training course is crafted for those who are serious about understanding the foundations of professional close protection, threat awareness, risk management, and security protocols. Whether you're eyeing a future in private security or simply keen to broaden your understanding of this high-responsibility role, this course delivers solid theoretical knowledge to get you on track. From managing secure environments to understanding the psychology of potential threats, this training dives into the essentials of operating with a calm head and sharp eyes. Learn about situational awareness, surveillance tactics, and the core duties of a professional bodyguard—all from a flexible, online learning format. No fluff, no overblown promises—just straight-talking, well-organised training that respects your time and your goals. Meet the Accreditation The CPD Certification Service (CPD QS) assures the Bodyguard Training course training and learning activities are relevant, reliable, and upto date. Expert Support Dedicated tutor support and 24/7 customer support are available to all students with this premium quality course. Key Benefits Learning materials of the Design course contain engaging voiceover and visual elements for your comfort. Get 24/7 access to all content for a full year. Each of our students gets full tutor support on weekdays (Monday to Friday) Course Curriculum: Here is a curriculum breakdown of the Bodyguard Training course: Module 01: Introduction to Bodyguard Training Who Is a Bodyguard? Roles and Responsibilities Close Protection in the UK What You Need to Become a Bodyguard How to Become a Professional Bodyguard Training RequirementsQualities You Must Possess Conflict Management Interpersonal Skills Module 02: Personal Security Definition of Personal Security Responsibility for Own Security Security Commensurate with Threat Constant Awareness Limiting Information Patterns and Habits Briefing the Principal Home Security Advice Module 03: Laws and Legislation UK Licensing The Security Industry Authority (SIA) Standards in Training Performance Criteria Range Statement Knowledge Criteria Core Competency Training Module 04: Threat Assessment and Risk Management Threat Assessment Why Do You Need Threat Assessment? Salting the Step Types of Threat Assessment Threat Pyramid Attentional Control Profiling Risk Assessment Motivation of Possible Attackers Possible Dangers Module 05: Operational Planning Preliminaries or Task Ground Situation Mission Execution Service Support Command and Signals The Close Protection Team Security Objectives Module 06: Behavioural Intelligence Identifying the Human Danger Factor Protective Intelligence Investigation Intelligence Analysis Psychological Perspectives Identifying the Dangerous Person in a Crowd Assessments Module 07: Anti-Ambush Drills Ambush Attack Fatal Mistakes Basic Principles Anti-Ambush Drill Techniques Stationary Cut-Off (Roadblock)Defensive TacticsTwo Car DrillsBlocked Front and RearVIP Vehicle DisabledRammingKerb JumpMotorcycle Attacks Module 08: Searching Techniques Efficient Searching Search Routine Searching People Bag Searches Hiding Places on a Person Effectively Searching Premises Degrees of Premises Search Module 09: On Foot Protection Foot Protection Alertness Arc of Vision Options to Consider in Foot Formation (Regarding Possible Threat Situations) Body Protection Formation Solo BodyguardTwo-Man TeamThree-Man TeamFour-Man TeamOpen Formation (Box)Close Formation (Box)Diamond FormationBox FormationSeven Man Circle FormationFence Line Formation MovementMoving Between Two Buildings via Corridors or PassagewaysMoving in Escalators, Malls, Office, Buildings, Airports etc.StaircasesLifts Module 10: Physical Intervention What Is Physical Intervention? Non-Restrictive Physical Intervention Restrictive Physical Intervention When Is Physical Intervention Necessary? Physical Intervention Training Different Types of Physical Intervention Risks of Physical Intervention Module 11: Vehicle Escort Procedures General Rules Choice of Vehicle Safety on the Road Two Car Drills Speed Convoy Control Laying Procedure Additional Vehicles Communication Module 12: Route Reconnaissance Introduction Security Considerations in General Principles of Route Selection and Planning Points of Vulnerability Checking the Route Thoroughly Targets at High Risk Looking for Communication Gaps Close Protection Drivers Diver Training Module 13: Surveillance and Basic Anti Surveillance Techniques What Is Surveillance? Observation Levels of Awareness Gathering and Controlling Information Electronic Surveillance Mobile Surveillance PreparationSurveillance VehicleConcealment TechniquesFoot Following The Urban Observation Post (OP) Module 14: Firearms and Explosive Handling How Guns Work Shooting Techniques Anatomy of a SlingHow to Attach a Rifle SlingHow to Adjust a SlingTransition from a Shoulder Carry to Solid Standing Shooting Position Gun Safety Tips Bomb Protection and Evacuation Explosive Search Improvised Explosive Devices (IEDs) Module 15: Protectee Variations VIP Protection Family Protection Details SpouseChildren to Age TwelveTeenagers Module 16: Medical Emergency Assistance Medical Emergencies Primary Survey AirwayBleedingCirculationShock Secondary Survey Rescue Breathing Resuscitation Control of Bleeding Treatment for Shock Choking Heart Attack Stroke Burns Medical Kit Module 17: How COVID-19 Affected Close Protection Services COVID-19 and the Guarding Industry How Close Protection Works in Practice? Guarantee Your Safety with Close Protection Services Inspection in Advance Making Advance Arrangements Defence Responsibilities Course Assessment To simplify the procedure of evaluation and accreditation for learners, we provide an automated assessment system. Upon completion of an online module, you will immediately be given access to a specifically crafted MCQ test. The results will be evaluated instantly, and the score will be displayed for your perusal. For each test, the pass mark will be set to 60%. When all tests have been successfully passed, you will be able to order a certificate endorsed by the Quality Licence Scheme. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by The CPD Certification Service Who is this course for? This Bodyguard Training course is designed to enhance your expertise and boost your CV. Learn key skills and gain a certificate of achievement to prove your newly-acquired knowledge. Requirements This Bodyguard Training course is open to all, with no formal entry requirements. Career path Upon successful completion of the Bodyguard Training Course, learners will be equipped with many indispensable skills and have the opportunity to grab.

Bodyguard Training - CPD Certified Course
Delivered Online On Demand9 hours
£12

CompTIA Certification - Complete Video Course

4.3(43)

By John Academy

Description: CompTIA or the Computing Technology Industry Association is a non-profit organisation that provides professional certificates for the IT industry. A license from CompTIA will increase your opportunity for career build-up. The CompTIA Certification - Complete Video Course course is the best choice for you if you want to obtain a professional degree in It. The course is taught in several sections and sub-sections. The CompTIA A+ 900 Certification series shows you the current knowledge and skills needed by today's IT professionals including configuring BIOS, motherboard, RAM types, PC installation, networking, etc. Then the CompTIA Network+ Certification provides in-depth information related to networking while the CompTIA Security+ section shows you how to secure your confidential data. Next, CompTIA Healthcare IT deals with the application of IT in the medical industry to provide excellent service to the patients while the CompTIA Linux+ course gives you a complete guide for the Linux Operating system. Finally, the CompTIA Advanced Security Practitioner (CASP) course will help you to know about the enterprise security architecture, security technology and resource technology so that you can determine the root of the security problem and solve the issues. CompTIA provides various certifications based on the different sectors of IT. The purpose of the bundled course is to prepare for those exams and at the same time to help you to gain the practical knowledge related to IT Sector. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

CompTIA Certification - Complete Video Course
Delivered Online On Demand4 days
£11.99

LINUX - CPD Certified

4.7(47)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Ever wondered what powers the vast majority of web servers, supercomputers, and even smartphones around the world? The answer is Linux, a powerful and versatile operating system. Did you know that according to a recent study, over 60% of web servers in the UK run on Linux? If you're interested in a career in IT, understanding Linux is an essential skill. This LINUX course bundle equips you with the knowledge and expertise to navigate the world of Linux, from the fundamentals to advanced security practices. This LINUX - CPD Certified Bundle Contains 15 of Our Premium Courses for One Discounted Price: Course 01: Learn Linux in 5 Days Course 02: LINUX File Management System Course 03: C Programming Language for Beginners on Linux Course 04: LINUX Security and Hardening Course 05: LINUX Shell Scripting Course 06: Learn Ethical Hacking From A-Z: Beginner To Expert Course 07: Securing an Ubuntu Linux Server against Hackers Masterclass Course 08: Bash Scripting, Linux and Shell Programming Masterclass Course 09: CompTIA Network Course 10: IT Support Technician Training Course 11: CompTIA PenTest+ (Ethical Hacking) course Course 12: Web Application Penetration Testing Course Course 13: SQL Database Administrator Course 14: Microsoft Access Databases Forms and Reports Course 15: Computer Operating System and Troubleshooting This LINUX bundle offers a structured learning path that starts with the foundational concepts of Linux, guiding you through the file system, working with the command line, and scripting languages like C and Bash. As you progress, you'll delve into essential security practices to harden your Linux systems against potential threats. Learning Outcomes of LINUX - CPD Certified Bundle Gain a solid understanding of the Linux operating system fundamentals. Master essential file management techniques and navigate the Linux directory structure. Learn C programming fundamentals within the Linux environment. Implement robust security measures to protect your Linux systems. Craft effective shell scripts to automate tasks and enhance efficiency. Take the first step towards a rewarding career in Linux and related fields and enroll today! Why Choose Our LINUX Bundle? Get a Free CPD Accredited Certificate upon completion of LINUX Get a free student ID card with LINUX Training Get instant access to this LINUX course. Learn LINUX from anywhere in the world The LINUX is affordable and simple to understand The LINUX is an entirely online, interactive lesson with voiceover audio Lifetime access to the LINUX course materials The LINUX comes with 24/7 tutor support Start your learning journey straightaway with LINUX! This LINUX's curriculum has been designed by LINUX experts with years of LINUX experience behind them. The LINUX course is extremely dynamic and well-paced to help you understand LINUX with ease. You'll discover how to master the LINUX skill while exploring relevant and essential topics. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this LINUX - CPD Certified Diploma bundle. Requirements You will not need any prior background or expertise to enrol in this LINUX - CPD Certified Diploma bundle. Career path After completing this LINUX - CPD Certified Diploma course, you are to start your career or begin the next phase of your career. Linux administrator Network security analyst Penetration tester Web developer IT support specialist Database administrator Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

LINUX - CPD Certified
Delivered Online On Demand3 days
£75