from12.88GBP/ h
Diploma in cyber security, specializing in digital forensics
Translated by Google. Click to view original.
ObjectivesThe program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:
• Implement technical strategies, tools, and techniques to secure data and information for your organization
• Adhere to ethical security behavior to analyze and mitigate risks
• Understand security in cloud computing architecture in depth
• Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
• Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
what will you learn
1. Inactive survey conduct
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.
2. Take an active survey
So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.
3. Gathering information and identifying weaknesses
Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.
4. Application testing
There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.
5. Digital Forensics
This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.
6. Digital Forensics: Getting Started with File Systems
Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.
7. Kali Linux Digital Forensics Tools: Imaging and Hash
Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.
8. Practical coding using Python
Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.
9. Social Engineering with Social Engineering Toolkit
The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.
10. Penetration testing with Metasploit Framework
Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
Location
Online via webcam
General info
Age: | Children (7-12 years old) Teenagers (13-17 years old) Adults (18-64 years old) Seniors (65+ years old) |
---|---|
Student level: | Beginner Intermediate Advanced |
Duration: | 60 minutes 120 minutes |
The class is taught in: | Arabic, English |
About Me
Translated by Google. Click to view original.
Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.Education
Translated by Google. Click to view original.
Computer Science Engineer, 2010Professorship in Computer Science Applied to Disposition, 2008
2020 Full-Stack Web Development with React Specialization
2021 IBM Cybersecurity Analyst Professional Certificate
Experience / Qualifications
Translated by Google. Click to view original.
Operating systems, website programming, networks, computer maintenance, information security, graphic design,Technical Support Fundamentals
The Bits and Bytes of Computer Networking
Operating Systems and You: Becoming a Power User
System Administration and IT Infrastructure Services
IT Security: Defense against the digital dark arts
A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters.
Required software:
-Photoshop
- Illustrator
-InDesign
program duration:
Photoshop: 6 hours
Illustrator: 6 hours
- InDesign: 6 hours
This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.
requirements
Networking basics basics
what will you learn
Wireshark Basic Functions
Use Wireshark's advanced features
Visualize network traffic with Wireshark
Using Wireshark on the command line
Network protocol analysis with Wireshark
Troubleshoot slow networks with Wireshark
The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles
Basic requirements
Knowledge of operating systems may be helpful, but not necessary.
what will you learn
Working with Linux and open source software
Linux installation and boot management
Linux environment management
Working with Linux package managers
Understand the command line
Find system help
Working with the Linux file system
Ask a question
Send a message explaining your needs and امين will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"
Ex. "Hi, when are you available to meet for a lesson?"
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from £12.88Online via webcam
100% Satisfaction Guarantee
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Online reputation
- Instructor since February 2022
- Phone number verified
- Linkedin connected
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from £12.88Online via webcam
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Share
You are here
Similar classes
Shalitha
Software Engineering : Python : Java : From Senior DeveloperI am a lecturer and a senior software engineer. I got my degree in Engineering with Mathematics and completed the masters with Computer Science heavily covered with mathematics. I have more than 7 years of teaching experience.
I will work with the student and get to know about his/her level. Then I will improve it from there. I will teach so that the learning will be an interesting experience for the child.
Brian
GCSE & A level Computer Science Revision Sessions.Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student.
I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential.
I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years.
I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for A level and GCSE.
I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.
Ricardo
Master Coding with a Pro Tutor: C, C++, C#, Python, Java, and More! Unleash Your Programming Potential Today!Welcome to Personalized Learning Excellence! In our first session, we'll set expectations and explore your preferred learning methods. My tutoring is all about you – flexible, interactive, and tailored to your pace.
Engage in dynamic voice chats, where questions are encouraged, and concepts are demystified at your speed. Whether you bring your ongoing projects or pinpoint specific challenges, I'm here to guide you. We'll dive deep, strengthening your reasoning skills as we unravel coding puzzles together.
Struggling with a particular topic? Fear not! Share your concerns, and I'll craft targeted activities that not only conquer the hurdle but also illuminate interconnected concepts, ensuring you build a robust foundation.
Unlock the potential of ongoing learning in our programming sessions. Each lesson serves as a stepping stone, building upon the last to deepen your coding expertise. Join me for a transformative experience where the cumulative effect of multiple sessions enhances your programming prowess. Let's embark on a series of lessons that delve into the intricacies of coding, turning each session into a valuable building block toward your programming mastery.
Let's embark on a learning journey where understanding takes the lead, and your coding proficiency soars to new heights!
Gabriela
ENGLISH, ACADEMIC WRITING, INTERNATIONAL LAW AND INTERNATIONAL RELATIONS, SECURITYHi there!
My name is Gabriela, and I graduated with a Master of Science from Leiden University four years ago. Since then, I've been working in international organizations and recently joined the private sector; my day-to-day work is mostly focused on keeping people safe and secure by analyzing geopolitical, economic, social, legal and security developments globally.
My area of expertise is in the fields of Criminology, International Relations, International Law and Security Studies. I also provide tutoring in English for academic purposes (including IELTS prep), intensive writing and research methodologies.
I have substantial experience in writing academic research papers on a wide variety of subjects. I am here to help high school students and undergraduates develop their writing and analytical skills and become more confident in their abilities. I am also experienced in teaching English as a second language.
My purpose is to motivate and help students solve problems and come up with solutions on their own. I believe that with the right kind of preparation, no subject can be ‘too difficult’. I like seeing students going the extra mile and overcoming obstacles. My teaching method consists of giving students specific guidelines and directions so that they can engage in a learning process and become efficient problem solvers themselves. I see tutoring as the first step towards progress, but I want my students to develop the skills necessary to become successful learners on their own!
I also provide teaching support for younger students. I have experience working with children aged 7 to 14 years old.
Please feel free to contact me if you need any further information.
Ozan
National curriculum in England: computing programmes of studyThis class is designed to provide pupils studying computer programming either as part of the National Curriculum in England (Key stage 1,2,3 & 4) or as a career path. It's purpose is to teach information and computation, digital systems and how they are put to use through programming, as well as to provide pupils with the capability to use information technology to create programs, systems and digital content. Also to provide computer literacy to pupils allowing them to express their thoughts and ideas through Information & Communication Technology (ICT) in a way that is suitable for todays workplaces.
The class aims to ensure that you:
- can understand and apply the fundamental principles and concepts of computer science, including abstraction, logic, algorithms and data representation
- can analyse problems in computational terms, and have repeated practical experience of writing computer programs in order to solve such problems
- can evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems
- are responsible, competent, confident and creative users of information and communication technology
Dr. Hani
Learn Networking Essentials, Gain hands-on experienceThis course provides an overview of the concepts and fundamentals of computer networks.
Topics include an overview of network architectures and topologies, IP addressing and subnetting, congestion mechanism CSMA/CD, troubleshooting commands and methods, switching and routing devices and their related decisions, TCP/IP layers and their protocols (FTP, HTTP, SMTP, DNS, DHCP, UDP, TCP, IP, ICMP etc...), security measures and how to secure your network using Access Lists and Firewall.
Georgi
Practical DevOps / Kubernetes / Programming coursesGet your foot in the door of DevOps and Programming. Experience the day-to-day life of a corporate DevOps/Software engineer, diving into the magic of building real projects while collaborating with a other motivated Team members. Boost your beginner skills to a robust level in months, not years.
Are you bored of passive video courses that leave your knowledge empty?
Then this course might be just what you're looking for!
Jump into a fully replicated the daily routine and workflow of a modern DevOps/Software engineer.
---
My name is Georgi and your course will be led by my battle-tested expertise in the IT industry.
I have many years of experience as a Network engineer, Software engineer, and DevOps & Cloud engineer.
Throughout my career, I have been involved in numerous projects, assisting a wide range of companies, from small startups to large corporations, in achieving their goals.
---
Alexandre
Programming class teacher for Bachelor, College and middle schoolEmbark on an immersive journey that will help you and clarify the material as we take a deep dive into of Java, Python, Object-Oriented Programming (OOP), Machine Learning, and Deep Learning, focusing on neural networks, Liquid State Machines (LSM), Genetic Algorithms (GA), and more.
Special rate applies for purely web/app development as a part-time full-stack developer/engineer.
Neel
Introduction to Python Programming and Machine Learning BasicsDive into the world of Python programming and machine learning in this hands-on introductory class! This course is designed for beginners and focuses on the foundational concepts of Python, along with the essentials of machine learning.
Course Highlights:
Python Fundamentals: Learn the basics of Python programming, including data types, control structures, functions, and libraries. Through practical exercises, you’ll gain confidence in writing and executing Python code.
Data Manipulation and Analysis: Explore popular libraries like NumPy and pandas to handle and analyze data efficiently. Understand how to clean, process, and visualize data, preparing it for machine learning tasks.
Introduction to Machine Learning: Discover the key concepts of machine learning, including supervised and unsupervised learning, algorithms, and model evaluation. Gain insights into how machines learn from data.
Hands-On Projects: Apply your knowledge through real-world projects, where you'll build simple machine learning models using libraries such as scikit-learn. You'll learn to make predictions and evaluate model performance.
Collaboration and Support: Work alongside fellow students in a collaborative environment, with ample opportunities for group discussions and individual support from the instructor.
Who Should Enroll: This class is ideal for anyone interested in starting a career in data science or machine learning, or for those looking to enhance their programming skills with practical applications in Python.
Join us and embark on an exciting journey into the realm of programming and machine learning!
Eiad
Learn programming, software development and marketing onlineYou will learn C# programming language from beginner to professional level.
You will learn how to create complete programs during the course and market them online.
Such as managing a restaurant, a mobile phone store, a point of sale company, a law office, a school or university, a mall, a clothing store, a car company, and many others.
Miguel
Cibersegurança - Sinta-se seguro ao usar o telemóvel / computador (remoto)Tem receio de ser enganado ou cair nalguma artimanha ao usar dispositivos eletrónicos?
Tem receio que acedam à sua conta bancária ou que lhe roubem os seus dados privados?
Gostava de reconhecer imediatamente emails, sites e contactos fraudulentos?
Gostava de aprender a manter os seus equipamentos protegidos de vírus, ameaças e ataques?
Acha que isto é tudo muito complicado para si?
Com aulas simples e diretas conseguirá fazer tudo isto rapidamente.
Muhammad Noman
Full-stack Development (Front-end /Back-end) - Complete Course AvailableIn this class, we will learn about full-stack development.
The following topics will cover:-
Introduction to Javascript in HTML
Using JavaScript Libraries
Deep knowledge of Backend language (PHP, Csharp .NET )
API Interactions
Version Control System (GIT)
How to Build and Maintain a Website
Final Project
Build an Interactive Resume!
Ludmila
Cisco CCNA, Packet Tracer, Switches, Routers, Subnetting, SAPI am a professional with more than 10 years of experience in multinational companies training and managing international teams in several European countries (Belgium, Poland, Czech Republic) and with extensive knowledge in SAP and Networking. I hold the official Cisco CCNA certification as well as a solid experience as a SAP trainer.
Additionally, I have a degree in basic (for beginners) and advanced digital competences.
What would the classes be like?
-Classes can be taught in English/Spanish/Ukrainian/Russian.
-The methodology of the classes would be oriented so that the student can internalise the basic and advanced concepts, as well as know how to apply from a practical point of view what he/she learns during the classes.
-Resolution of doubts and exercises.
-Advice on what to study and how to do it.
------
-For those who are interested, I also prepare those who are in the process of obtaining the official Cisco CCNA certification.
Muhammad
computer networking with CCNA CCNP MCSE AND VMWARE ESXII am a highly experienced computer network engineer with over 9 years of field expertise and 4 years of online teaching. My core specialties include Cisco CCNA, CCNP, VMware ESXi, Fortigate firewall, MCSE Server, and Linux systems. I focus on helping students and professionals excel in networking, system administration, and cybersecurity.
With a solid foundation in both practical and theoretical knowledge, I provide hands-on learning experiences using real-world scenarios. I specialize in simplifying complex topics for students of all skill levels, ensuring they build a strong understanding of core concepts.
Skills and Expertise
Cisco CCNA & CCNP: Master the core networking concepts and configurations with practical labs.
VMware ESXi Virtualization: Virtualization expertise for data center management and optimization.
Fortigate Firewall: Learn advanced security configurations to secure and optimize networks.
MCSE Server: Comprehensive teaching on Windows Server environments for enterprise-level management.
Linux: Guide students on Linux server administration and configuration, focusing on open-source technologies.
Teaching Approach
My teaching method is highly interactive, focusing on personalized learning based on each student's unique needs. I emphasize real-world labs, troubleshooting, and best practices to ensure students can apply their skills directly in the field. Whether you are preparing for a certification exam, aiming to upgrade your skills, or pursuing a new career path, I am dedicated to helping you achieve your goals.
Why Choose Me?
Proven track record with hundreds of successful students.
Focus on practical, job-ready skills.
Custom-tailored lessons to meet your learning pace and objectives.
Guidance on certifications and career advancement.
Illia
Java Development and Software Architecture: From Beginner to ProfessionalThroughout my career, I have taken on various roles that highlight my dedication to education and mentorship. In the companies where I worked, I was responsible for onboarding new joiners and served as a team buddy for newcomers. This role involved providing guidance, support, and a smooth transition into the team environment.
I have also been instrumental in educating junior and mid-level developers, introducing new concepts, and teaching them how to effectively apply these ideas in their work. My approach ensures that team members are well-equipped with the latest knowledge and best practices in the industry.
My comprehensive experience in tutoring and teaching reflects my commitment to fostering a collaborative and growth-oriented learning environment. Whether in a formal setting or through informal sessions, I am dedicated to empowering others to achieve their full potential.