• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

119 Cryptography courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

By Packt

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Delivered Online On Demand
£53.99

Certified Information Systems Security Officer (CISSO) - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: The uniquely management-focused CISSO certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise's information security. CISSO means higher earning potential and career advancement. Recent independent studies consistently rank CISSO as one of the highest paying and sought after IT certifications. This Certified Information Systems Security Officer (CISSO) - Complete Video Course covers everything you need to know about becoming a Certified Information Systems Security Officer. In this course you will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security, and more. So, get this to demonstrate your information security management expertise and this course will enhance your competitive advantage. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Information Systems Security Officer (CISSO) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Information Systems Security Officer (CISSO) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Mock Exam Mock Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Security Officer (CISSO) - Complete Video Course
Delivered Online On Demand
£24

Foundations of IT Security: Protecting Digital Assets

5.0(2)

By Studyhub UK

Dive deep into the realm of cyber safety with 'Foundations of IT Security: Protecting Digital Assets'. This curriculum ensures you grasp the essentials of IT defence, from understanding the rudiments to grasping advanced techniques. Chart your journey through crucial subjects such as network safety, OS safeguarding and the profound world of cryptography. In an era where digital threats loom large, this comprehensive programme equips you with the knowledge to defend the vast expanse of digital assets effectively. Learning Outcomes * Understand the core principles of IT security and its significance. * Develop insights into setting up and managing robust security policies and procedures. * Master the intricacies of network, operating system, and web protection. * Delve into the art of cryptography and familiarise with advanced encryption methods. * Stay abreast with the latest and upcoming shifts in IT security paradigms. WHY BUY THIS FOUNDATIONS OF IT SECURITY: PROTECTING DIGITAL ASSETS? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. WHO IS THIS FOUNDATIONS OF IT SECURITY: PROTECTING DIGITAL ASSETS FOR? * Individuals keen on delving into the digital protection domain. * IT professionals aiming to bolster their security knowledge. * Entrepreneurs wishing to safeguard their digital assets. * Technical enthusiasts curious about evolving IT security trends. * Organisations aspiring to upgrade their digital defence mechanisms. CAREER PATH * IT Security Analyst: £40,000 - £60,000 * Network Security Specialist: £45,000 - £65,000 * Cryptographer: £50,000 - £70,000 * Web Security Administrator: £42,000 - £58,000 * Wireless Security Consultant: £47,000 - £68,000 * Digital Protection Strategist: £52,000 - £75,000 PREREQUISITES This Foundations of IT Security: Protecting Digital Assets does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CERTIFICATION After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. COURSE CURRICULUM Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00

Foundations of IT Security: Protecting Digital Assets
Delivered Online On Demand
£10.99

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 ABOUT THIS COURSE   What will you learn?   * Critical data protection concepts and practices that impact IT * Consumer data protection expectations and responsibility * How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market * How to establish data protection practices for data collection and transfer * How to pre-empt data protection issues in the Internet of Things * How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance * How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   * Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   * Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   * Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   * Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   * Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   * Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   * Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   * Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   * Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   * Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   * Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use.   PREREQUISITES   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. WHAT'S INCLUDED?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees WHO SHOULD ATTEND?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; * Data Protection Officers  * IT Managers and Administrators  * Records Managers  * System Developers  * IT Security specialists  ACCREDITATION OUR GUARANTEE   * We are an approved IAPP Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered Online
Dates arranged on request
£1395

Level 2 Certificate in the Principles of Cyber Security

5.0(2)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Level 2 Certificate in the Principles of Cyber Security Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter With hacking threats surging, cybersecurity expertise is urgently needed across the UK. Cybercrime costs companies an estimated £3.1 billion per year, while individuals are attacked every 1.3 seconds. Do you want to protect systems from risks and attacks? This Level 2 Certificate in the Principles of Cyber Security bundle provides the technical abilities and ethical grounding today's IT teams demand. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Level 2 Certificate in the Principles of Cyber Security bundle is a comprehensive programme that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enroll in the Level 2 Certificate in the Principles of Cyber Security Online Training, you'll receive 25 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Bundle: * Course 01: Level 2 Certificate in the Principles of Cyber Security * Course 02: CompTIA Security+ (SY0-601) * Course 03: CompTIA A+ (220-1001) * Course 04: CompTIA A+ (220-1002) * Course 05: Cloud Computing / CompTIA Cloud+ (CV0-002) * Course 06: Learning Computers and Internet * Course 07: CompTIA CySA+ Cybersecurity Analyst (CS0-002) * Course 08: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 09: CompTIA Network+ Certification (N10-007) * Course 10: Diploma in CompTIA Network+ Training at QLS Level 7 * Course 11: CompTIA PenTest+ (Ethical Hacking) * Course 12: Cryptography * Course 13: IT Support Technician * Course 14: Functional Skills IT * Course 15: Essential IT Skills Level 2 * Course 16: Cyber Security Advanced Training * Course 17: Cyber Security Incident Handling and Incident Response * Course 18: Cyber Security Awareness Training * Course 19: Cyber Security * Course 20: Learn Ethical Hacking From A-Z: Beginner To Expert * Course 21: IT: Ethical Hacking & IT Security * Course 22: Internet of Things * Course 23: Basics of Network Security * Course 24: Computer Networks Security from Scratch to Advanced * Course 25: IGCSE ICT: Network Essentials With a Level 2 Certificate in the Principles of Cyber Security, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. Learning Outcomes of this bundle * Attain top CompTIA certifications in security, networks and IT * Assess infrastructure risks and fortify systems against threats * Detect intrusions through ethical hacking techniques * Investigate and respond to breaches professionally * Apply cryptography methods for data protection * Uphold lawful and ethical cybersecurity standards Don't let this opportunity pass you by. Enrol in the Level 2 Certificate in the Principles of Cyber Security today and take the first step towards achieving your goals and dreams. Why buy this Bundle? * Free CPD Accredited Certificate upon completion of Level 2 Certificate in the Principles of Cyber Security * Get a free student ID card with Level 2 Certificate in the Principles of Cyber Security * Lifetime access to the Level 2 Certificate in the Principles of Cyber Security course materials * Get instant access to this Level 2 Certificate in the Principles of Cyber Security course * Learn Level 2 Certificate in the Principles of Cyber Security from anywhere in the world * 24/7 tutor support with the Level 2 Certificate in the Principles of Cyber Security course. Start your learning journey straightaway with our Level 2 Certificate in the Principles of Cyber Security Training! Level 2 Certificate in the Principles of Cyber Security premium bundle consists of 25 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of the Level 2 Certificate in the Principles of Cyber Security is meticulously designed to maximize learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification of Level 2 Certificate in the Principles of Cyber Security You have to complete the assignment given at the end of the Level 2 Certificate in the Principles of Cyber Security course. After passing the Level 2 Certificate in the Principles of Cyber Security exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Bundle course is ideal for: * Students seeking mastery in Level 2 Certificate in the Principles of Cyber Security * Professionals seeking to enhance Level 2 Certificate in the Principles of Cyber Security skills * Individuals looking for a Level 2 Certificate in the Principles of Cyber Security-related career. * Anyone passionate about Level 2 Certificate in the Principles of Cyber Security REQUIREMENTS This Level 2 Certificate in the Principles of Cyber Security doesn't require prior experience and is suitable for diverse learners. CAREER PATH This Level 2 Certificate in the Principles of Cyber Security bundle will allow you to kickstart or take your career in the related sector to the next stage. * Security analyst * Security engineer * Penetration tester * Incident responder * Network defender CERTIFICATES CPD ACCREDITED DIGITAL CERTIFICATE Digital certificate - Included CPD ACCREDITED HARD COPY CERTIFICATE Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

Level 2 Certificate in the Principles of Cyber Security
Delivered Online On Demand
£149

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

DESCRIPTION: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand
£24

Certified Secure Web Application Engineer (CSWAE) - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: Web applications are increasingly more sophisticated and as such, they are critical to almost all major online businesses. This Certified Secure Web Application Engineer (CSWAE) - Complete Video Course covers everything you need to know about becoming a Certified Secure Web Application Engineer. In this course, you will learn about web application security, secure SDLC, OWASP TOP 10, risk management, threat modeling, authentication and authorization attacks, session management, security architecture, input validation and data sanitization, AJAX security, insecurity code discovery and mitigation, application mapping, cryptography, and testing methodologies. This Certified Secure Web Application Engineer (CSWAE) - Complete Video Course will provide you with a thorough and broad understanding of secure application concepts, principles, and standards. You will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Secure Web Application Engineer (CSWAE) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Secure Web Application Engineer (CSWAE) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Web Application Security Web Application Security FREE 01:20:00 Secure SDLC Secure SDLC 00:26:00 OWASP TOP 10 OWASP TOP 10 00:28:00 Risk Management Risk Management 00:35:00 Threat Modeling Threat Modeling 00:18:00 Authentication and Authorization Attacks Authentication and Authorization Attacks 00:24:00 Session Management Session Management 00:35:00 Security Architecture Security Architecture 00:29:00 Input Validation and Data Sanitization Input Validation and Data Sanitization 00:24:00 AJAX Security AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping Application Mapping 00:07:00 Cryptography Cryptography 00:52:00 Testing Methodologies Testing Methodologies 00:31:00 Mock Exam Mock Exam- Certified Secure Web Application Engineer (CSWAE) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Secure Web Application Engineer (CSWAE) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Secure Web Application Engineer (CSWAE) - Complete Video Course
Delivered Online On Demand
£23

Network Hacking Training

By Course Gate

Take This Course * £175.00 £21.00 * 1 year * Intermediate * Course Certificate * Number of Units38 * Number of Quizzes0 * 5 hours, 2 minutes Gift this course * * * * DESCRIPTION The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.  By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. WHO IS THIS COURSE FOR? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. REQUIREMENTS Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD CERTIFICATE FROM COURSE GATE  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. CAREER PATH This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. COURSE CURRICULUM Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Network Hacking Training
Delivered Online On Demand
£21

Quantum for Everyone

By Qureca

A second quantum revolution with far reaching applications is unfolding. This non-technical course will teach you how to navigate the rise of quantum technologies and its applications across industries. Whether you want to know what’s behind the buzzwords or whether you want to perhaps use quantum technologies yourself either in a personal context or in a corporation or other organisation, this course will teach you how. There is no prerequisite for taking this course.

Quantum for Everyone
Delivered Online On Demand
£400

Cisco ASA Firewall Training with Step-by-Step Lab Workbook

4.8(8)

By Skill Up

Build shields with CISCO ASA Firewall skills and survive the cyberattacks. Learn Cisco ASA Firewall Basic Configuration Commands, Introduction to Routing & Static Routing.

Cisco ASA Firewall Training with Step-by-Step Lab Workbook
Delivered Online On Demand
£25