Information Technology

Main Categories

Sub Categories

Information Technology

Ratings

Level

Price

Materials

Video Duration

Information Technology

Information Technology courses are perhaps one of the most popular programs that many individuals choose to take up in their career. The reason for this choice is rather obvious. In today’s modern workplace, no matter what you are doing or where you are working, IT is a crucial component that is integrated into every aspect of your job role. It is also something that can help you greatly in your personal life and definitely pave the way for many different types of career paths. The number of jobs available for proficient IT professionals is high and available around the world.

Digital Forensics for Cyber Professionals ACCREDITED BY CPD
Digital Forensics for Cyber Professionals
04 Sections Beginner to Intermediate CPD
  • Have a clear understanding of how to use open source tools to collect digital forensic information from Linux and Windows systems
  • Learn how to conduct static malware analysis of live Ransomware using forensic techniques and tools
  • Learn how to do forensic analysis on live systems
  • Learn basic to advanced techniques of GIAC and computer forensic certifications
Ethical Hacking: Cyber Anonymity ACCREDITED BY CPD
Ethical Hacking: Cyber Anonymity

ACCREDITED BY CPD

66
Ethical Hacking: Cyber Anonymity
03 Sections Beginner to Intermediate CPD
  • Have a clear understanding of network anonymity and how to maintain it
  • Learn about data privacy and host privacy
  • Learn about IP Spoofing, MAC Spoofing and email security
  • Learn how hackers conceal their real identities online
Database Security for Cyber Professionals ACCREDITED BY CPD
Database Security for Cyber Professionals
13 Sections Beginner to AdvanceCPD
  • Understand about database core security, platform hardening, MySQL architecture, and exploits
  • Learn to understand and mitigate database threats.
  • Learn how to secure open source and commercial database platforms against modern threats and attack vectors.
  • Gain an insight on storage encryption, key management, big data, and much more.
Incident Response for Cyber Professionals ACCREDITED BY CPD
Incident Response for Cyber Professionals
16 Sections Beginner to AdvanceCPD
  • Defend networks and systems from common threats and attacks using open source incident response tools.
  • You will learn necessary knowledge and skills to become a cyber professionals.
  • Architect IDS and network perimeter security environments.
  • Use Snort and Bro to conduct incident response.
Ethical Hacking: Cryptography for Hackers ACCREDITED BY CPD
Ethical Hacking: Cryptography for Hackers
12 Sections Beginner to AdvanceCPD
  • Understanding advanced cryptology
  • Message authentication codes and hashes
  • Transport layer security and virtual private networking
  • Windows encryptions, storage encryption and web encoding
  • Using cryptography for user authentication
  • Protecting data from theft and alteration
  • Learn about cryptography and its importance in the digital world
Ethical Hacking: Hacking Applications ACCREDITED BY CPD
Ethical Hacking: Hacking Applications
09 Sections Beginner to AdvanceCPD
  • Understand how websites work, how to discover and exploit web application vulnerabilities to hack websites.
  • Understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret.
  • Learn about XSS attacks, buffer overflows, hacking AJAX and more.
  • Learn how to secure modern application architecture.
Ethical Hacking: Hacking Databases ACCREDITED BY CPD
Ethical Hacking: Hacking Databases

ACCREDITED BY CPD

88
Ethical Hacking: Hacking Databases
10 Sections Beginner to AdvanceCPD
  • Understand the importance of database security.
  • Learn about Shodan, operating system hardening, and big data security.
  • Utilise MySQL for Lab Buildout, Lockdown, and Security Architecture.
  • Understand and mitigate database threats.
Ethical Hacking: Honeypots, IDS and Firewalls ACCREDITED BY CPD
Ethical Hacking: Honeypots, IDS and Firewalls
11 Sections Beginner to AdvanceCPD
  • Learn how to confuse, detect, and prevent intrusion.
  • Learn about Intrusion Detection Systems (IDS)
  • Understand about Snort, Honeydrive installation, and advanced perimeter security.
  • Understand about firewalls, LAN security, threat management, and DNSSec.
Ethical Hacking: Social Engineering ACCREDITED BY CPD
Ethical Hacking: Social Engineering

ACCREDITED BY CPD

86
Ethical Hacking: Social Engineering
06 Sections Beginner to AdvanceCPD
  • Learn how social engineering works
  • Learn the fundamentals of exploitation
  • Becoming an effective social engineer
  • Learn all the techniques and defenses are available in the field of cyber security.
Ethical Hacking: Malware Development ACCREDITED BY CPD
Ethical Hacking: Malware Development

ACCREDITED BY CPD

88
Ethical Hacking: Malware Development
08 Sections Beginner to AdvanceCPD
  • Learn to understand and prevent malicious software.
  • Introduction into malware and its development
  • Internet Worm Maker, JPS Virus Maker, and Ghost Eye.
  • How to create a custom trojan, perform a static malware analysis etc.
Firebase Firestore for iOS ACCREDITED BY CPD
Firebase Firestore for iOS

ACCREDITED BY CPD

85
Firebase Firestore for iOS
30 Sections Beginner to AdvanceCPD
  • Build your own apps using the new Firestore real time database
  • Learn how to create and save data to your Firestore database
  • Add powerful login capabilities to your apps using firebase authentication
  • Use Firestore security features to protect your database and restrict access to authorised users only
Ethical Hacking: Recon and Footprinting ACCREDITED BY CPD
Ethical Hacking: Recon and Footprinting
11 Sections Beginner to AdvanceCPD
  • Learn about web site analysis performance and attack methods.
  • Port inspection with Netstat, Nmap and Metasploit, and Maltego.
  • How to perform a SNMP probe and SMTP inspection, and so much more
  • Understand website and e-mail footprinting.
Ethical Hacking: Wireless Hacking ACCREDITED BY CPD
Ethical Hacking: Wireless Hacking

ACCREDITED BY CPD

85
Ethical Hacking: Wireless Hacking
09 Sections Beginner to AdvanceCPD
  • Introduction to wireless hacking, wireless security concepts and architectures and the components used to secure them.
  • Understand about security weaknesses and the best practices for recognizing them.
  • Learn about Aircrack, Reaver, Bluetooth, and Ubertooth.
  • Understand about advanced wireless security, Kismac, Metasploit, and much more.
Wireless Hacking for Cyber Professionals ACCREDITED BY CPD
Wireless Hacking for Cyber Professionals
08 Sections Beginner to AdvanceCPD
  • Learn about wireless hacking, hacking terminology and how to prevent advanced wireless attacks.
  • Learn how to wirelessly hack networks as part of sanctioned penetration testing activities.
  • Understand about the tools and techniques related to hacking, auditing, and pen testing wireless network protocols.
  • Gain an insight into topics such as advanced wireless security, Wifi Pineapples, Bluetooth scanning, and much more.
Webpack: Starting with Webpack ACCREDITED BY CPD
Webpack: Starting with Webpack

ACCREDITED BY CPD

76
Webpack: Starting with Webpack
04 Sections Beginner to Intermediate CPD
  • Get a solid understanding of how Webpack really works and when to use it.
  • Create fully functional, production ready Webpack config
  • Learn about Webpack loaders and plugins
  • Get a solid foundation for learning advanced Webpack features.
Webpack: Starting with Webpack ACCREDITED BY CPD
Webpack: Starting with Webpack

ACCREDITED BY CPD

76
Webpack: Starting with Webpack
04 Sections Beginner to Intermediate CPD
  • Get a solid understanding of how Webpack really works and when to use it.
  • Create fully functional, production ready Webpack config
  • Learn about Webpack loaders and plugins
  • Get a solid foundation for learning advanced Webpack features.
Wireless Hacking for Cyber Professionals ACCREDITED BY CPD
Wireless Hacking for Cyber Professionals
08 Sections Beginner to AdvanceCPD
  • Learn about wireless hacking, hacking terminology and how to prevent advanced wireless attacks.
  • Learn how to wirelessly hack networks as part of sanctioned penetration testing activities.
  • Understand about the tools and techniques related to hacking, auditing, and pen testing wireless network protocols.
  • Gain an insight into topics such as advanced wireless security, Wifi Pineapples, Bluetooth scanning, and much more.
Ethical Hacking: Wireless Hacking ACCREDITED BY CPD
Ethical Hacking: Wireless Hacking

ACCREDITED BY CPD

85
Ethical Hacking: Wireless Hacking
09 Sections Beginner to AdvanceCPD
  • Introduction to wireless hacking, wireless security concepts and architectures and the components used to secure them.
  • Understand about security weaknesses and the best practices for recognizing them.
  • Learn about Aircrack, Reaver, Bluetooth, and Ubertooth.
  • Understand about advanced wireless security, Kismac, Metasploit, and much more.
Ethical Hacking: Recon and Footprinting ACCREDITED BY CPD
Ethical Hacking: Recon and Footprinting
11 Sections Beginner to AdvanceCPD
  • Learn about web site analysis performance and attack methods.
  • Port inspection with Netstat, Nmap and Metasploit, and Maltego.
  • How to perform a SNMP probe and SMTP inspection, and so much more
  • Understand website and e-mail footprinting.
Firebase Firestore for iOS ACCREDITED BY CPD
Firebase Firestore for iOS

ACCREDITED BY CPD

85
Firebase Firestore for iOS
30 Sections Beginner to AdvanceCPD
  • Build your own apps using the new Firestore real time database
  • Learn how to create and save data to your Firestore database
  • Add powerful login capabilities to your apps using firebase authentication
  • Use Firestore security features to protect your database and restrict access to authorised users only
Ethical Hacking: Malware Development ACCREDITED BY CPD
Ethical Hacking: Malware Development

ACCREDITED BY CPD

88
Ethical Hacking: Malware Development
08 Sections Beginner to AdvanceCPD
  • Learn to understand and prevent malicious software.
  • Introduction into malware and its development
  • Internet Worm Maker, JPS Virus Maker, and Ghost Eye.
  • How to create a custom trojan, perform a static malware analysis etc.
Ethical Hacking: Social Engineering ACCREDITED BY CPD
Ethical Hacking: Social Engineering

ACCREDITED BY CPD

86
Ethical Hacking: Social Engineering
06 Sections Beginner to AdvanceCPD
  • Learn how social engineering works
  • Learn the fundamentals of exploitation
  • Becoming an effective social engineer
  • Learn all the techniques and defenses are available in the field of cyber security.
Ethical Hacking: Honeypots, IDS and Firewalls ACCREDITED BY CPD
Ethical Hacking: Honeypots, IDS and Firewalls
11 Sections Beginner to AdvanceCPD
  • Learn how to confuse, detect, and prevent intrusion.
  • Learn about Intrusion Detection Systems (IDS)
  • Understand about Snort, Honeydrive installation, and advanced perimeter security.
  • Understand about firewalls, LAN security, threat management, and DNSSec.
Ethical Hacking: Hacking Databases ACCREDITED BY CPD
Ethical Hacking: Hacking Databases

ACCREDITED BY CPD

88
Ethical Hacking: Hacking Databases
10 Sections Beginner to AdvanceCPD
  • Understand the importance of database security.
  • Learn about Shodan, operating system hardening, and big data security.
  • Utilise MySQL for Lab Buildout, Lockdown, and Security Architecture.
  • Understand and mitigate database threats.
Ethical Hacking: Hacking Applications ACCREDITED BY CPD
Ethical Hacking: Hacking Applications
09 Sections Beginner to AdvanceCPD
  • Understand how websites work, how to discover and exploit web application vulnerabilities to hack websites.
  • Understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret.
  • Learn about XSS attacks, buffer overflows, hacking AJAX and more.
  • Learn how to secure modern application architecture.
Ethical Hacking: Cryptography for Hackers ACCREDITED BY CPD
Ethical Hacking: Cryptography for Hackers
12 Sections Beginner to AdvanceCPD
  • Understanding advanced cryptology
  • Message authentication codes and hashes
  • Transport layer security and virtual private networking
  • Windows encryptions, storage encryption and web encoding
  • Using cryptography for user authentication
  • Protecting data from theft and alteration
  • Learn about cryptography and its importance in the digital world
Incident Response for Cyber Professionals ACCREDITED BY CPD
Incident Response for Cyber Professionals
16 Sections Beginner to AdvanceCPD
  • Defend networks and systems from common threats and attacks using open source incident response tools.
  • You will learn necessary knowledge and skills to become a cyber professionals.
  • Architect IDS and network perimeter security environments.
  • Use Snort and Bro to conduct incident response.
Database Security for Cyber Professionals ACCREDITED BY CPD
Database Security for Cyber Professionals
13 Sections Beginner to AdvanceCPD
  • Understand about database core security, platform hardening, MySQL architecture, and exploits
  • Learn to understand and mitigate database threats.
  • Learn how to secure open source and commercial database platforms against modern threats and attack vectors.
  • Gain an insight on storage encryption, key management, big data, and much more.
Ethical Hacking: Cyber Anonymity ACCREDITED BY CPD
Ethical Hacking: Cyber Anonymity

ACCREDITED BY CPD

66
Ethical Hacking: Cyber Anonymity
03 Sections Beginner to Intermediate CPD
  • Have a clear understanding of network anonymity and how to maintain it
  • Learn about data privacy and host privacy
  • Learn about IP Spoofing, MAC Spoofing and email security
  • Learn how hackers conceal their real identities online
Digital Forensics for Cyber Professionals ACCREDITED BY CPD
Digital Forensics for Cyber Professionals
04 Sections Beginner to Intermediate CPD
  • Have a clear understanding of how to use open source tools to collect digital forensic information from Linux and Windows systems
  • Learn how to conduct static malware analysis of live Ransomware using forensic techniques and tools
  • Learn how to do forensic analysis on live systems
  • Learn basic to advanced techniques of GIAC and computer forensic certifications
HOT & NEW

Featured Course

By Name Of Author
4.9 (19)

Build a Successful Online Coaching or Consulting Business

What it Takes, What You Need to Know & Do, and What to Watch Out For, From Someone Who's Been In Business for 20+ Years

  • Updated February 2021 4 total hours
  • 30 lectures
  • Intermediate

EXCELLENT REVIEWS

4.95
| 133 Reviews
Top Companies Trust Next Learn Academy
Get your team access to Next Learn Academy’s top 600+ Courses
TRY FOR BUSINESS

Top Business Associates choose Next Learn Academy