-
All
-
Online
-
Filters
Hacker Distance and online learning college courses
- Vocational qualification
- Online
- Different dates available
...course with the official exam. Once students have completed and passed the course and examination respectively, they will be able to function in roles such as systems administrator... Learn about: IT Security, IT risk, Network security...
- Vocational qualification
- Online
- Different dates available
...course with the official exam. Once students have completed and passed the course and examination respectively, they will be able to function in roles such as systems administrator... Learn about: Data security, Network security, Web servers...
- Vocational qualification
- Online
- Different dates available
...course with the official exam. Once students have completed and passed the course and examination respectively, they will be able to function in roles such as systems administrator... Learn about: IT Security, IT risk, Data security...
Similar training in other typologies
- Course
- Online
- Intermediate
- Different dates available
- 1 Year
- Delivery of study materials
- Virtual classes
- Support service
- Online campus
...In doing so, you will be able to understand how malware and destructive viruses’ function. In addition, the CPEH course will help you learn how to implement... Learn about: Ethical Hacking, Linux Fundamentals, Security Devices...
- Course
- Online
- Beginner
...: tailoring your approach to maximise impact Mastering cybersecurity Instant credibility & authority as a hacker Properly networking You’ll also be able to access a number of exclusive bonus resources to help you along your ethical hacking journey, including: Scanning websites/webapps for vulnerabilities SQL... Learn about: Web Programming, Web Development...
- Vocational qualification
- Online
- Different dates available
...IT or Cyber security is recognised as a priority for governments and large organisations throughout the world. Cyber-attacks are widely reported and whilst... Learn about: IT Systems, Computer Engineering, IT Security...
- Bachelor's degree
- Online
- Different dates available
- 2 Years
- Online campus
...Software Engineering & Project management Data Communication and Computer Networks IT Service Management Advanced Programming using Java Web Technologies... Learn about: Computer Science, Computer Sciences, IT Engineering...
- Course
- Online
- Different dates available
...Identity theft is an increasingly common crime. The term 'identity theft' refers to criminals obtaining information about you or your customers that... Learn about: IT Security...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
... and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics... Learn about: Web Application Vulnerabilities, Web servers, SQL Injection...
... and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics... Learn about: Web Application Vulnerabilities, Web servers, SQL Injection...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
-
Good course. Easy to follow, though as with everything, there were parts that I wished were more clear. But overall is was great. Also very helpful staff.
← | →
-
I liked the course and have enrolled on another which I'm sure I'll enjoy and engage with just as much. The website is easy to use and follow and the material is educational and easy to follow. I would definitely recommend.
← | →
-
It was an excellent course that helped me a lot. You could do everything online.
← | →
- Vocational qualification
- Online
- Different dates available
...Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems... Learn about: Security Management, Network monitoring, Network Training...
...Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems... Learn about: Security Management, Network monitoring, Network Training...
-
Good course. Easy to follow, though as with everything, there were parts that I wished were more clear. But overall is was great. Also very helpful staff.
← | → see all
-
I liked the course and have enrolled on another which I'm sure I'll enjoy and engage with just as much. The website is easy to use and follow and the material is educational and easy to follow. I would definitely recommend.
← | → see all
-
It was an excellent course that helped me a lot. You could do everything online.
← | → see all
-
This course helped in my career since I’m a business Analyst now.
← | →
- Course
- Online
- Different dates available
- 1 Year
... provided with this course. You will also learn to understand how a hacker thinks, what tactics they use to penetrate corporate networks and the countermeasures that you will enforce to save your company from costly cyber-attacks. Approved Curriculum ITonlinelearning only provides EC-Council authorised... Learn about: IDS training...
... provided with this course. You will also learn to understand how a hacker thinks, what tactics they use to penetrate corporate networks and the countermeasures that you will enforce to save your company from costly cyber-attacks. Approved Curriculum ITonlinelearning only provides EC-Council authorised... Learn about: IDS training...
-
This course helped in my career since I’m a business Analyst now.
← | →
-
I feel this course is easy to do because of the easy study material and amazing support service. I will definitely recommend this to others.
← | →
- Course
- Online
- Intermediate
- Different dates available
- 40h - 12 Months
- Virtual classes
- Support service
- Delivery of study materials
- Online campus
...In doing so, Mile2 has become the de facto standard for a number organizations and militaries worldwide. The CPEH certification training enables students... Learn about: Access controls...
...In doing so, Mile2 has become the de facto standard for a number organizations and militaries worldwide. The CPEH certification training enables students... Learn about: Access controls...
-
I feel this course is easy to do because of the easy study material and amazing support service. I will definitely recommend this to others.
← | →
- Course
- Online
- Intermediate
- Different dates available
...officers Auditors Security professionals Site administrators Anyone who wants to learn how to secure themselves from Cyber Crime. The center will contact... Learn about: Programming C, Ethical Hacking, Information Systems...
-
It’s was easy to use and the service team is very responsive. It was great to do it at own time since I had just become a new mum when I started.
← | →
-
The course was great. Anytime I had questions I received help promptly. I’m pleased.
← | →
- Vocational qualification
- Online
- Different dates available
...process • Conversation of strategies into implementation plans • Integrating enterprise business objectives and info security policies • Security stakeholder... Learn about: Data Mining, Certified Ethical Hacker, IT Security...
...process • Conversation of strategies into implementation plans • Integrating enterprise business objectives and info security policies • Security stakeholder... Learn about: Data Mining, Certified Ethical Hacker, IT Security...
-
It’s was easy to use and the service team is very responsive. It was great to do it at own time since I had just become a new mum when I started.
← | → see all
-
The course was great. Anytime I had questions I received help promptly. I’m pleased.
← | → see all
-
Excellent provider! Totally recommended. Ryan helped me to enrol and with my CV. Now, finally I got into IT industry and I do what I love!
← | →
-
I am glad to let you know that I got a job in Whitehatsec.com and I am taking a coaching at the Santa Clara HQ in Silicon Valley of California. I am thanks to you as I was untrained prior to pursuing this course. I managed to crack the interview and I will be employed in their new European Threat Research Centre in Belfast. Thanks all the help and assistance in searching for a great employment.
← | →
-
I am thanks to Alex for the support in my buy. I am adjusting to the system and the live labs and I am glad with the learning involvement. His guidance and support was very helpful. I am grateful to him for considering my visual impairment and understanding my situation. Now I am quite positive that I will succeed with this program.
← | →
- Course
- Online
- Beginner
- Different dates available
- 12 Months
...test, hack and secure your own systems with the books and tools provided with this course. You will also learn to understandhow a hacker thinks... Learn about: Service Management, Network monitoring, Network analysis...
...test, hack and secure your own systems with the books and tools provided with this course. You will also learn to understandhow a hacker thinks... Learn about: Service Management, Network monitoring, Network analysis...
-
Excellent provider! Totally recommended. Ryan helped me to enrol and with my CV. Now, finally I got into IT industry and I do what I love!
← | → see all
-
I am glad to let you know that I got a job in Whitehatsec.com and I am taking a coaching at the Santa Clara HQ in Silicon Valley of California. I am thanks to you as I was untrained prior to pursuing this course. I managed to crack the interview and I will be employed in their new European Threat Research Centre in Belfast. Thanks all the help and assistance in searching for a great employment.
← | → see all
-
I am thanks to Alex for the support in my buy. I am adjusting to the system and the live labs and I am glad with the learning involvement. His guidance and support was very helpful. I am grateful to him for considering my visual impairment and understanding my situation. Now I am quite positive that I will succeed with this program.
← | → see all
- Course
- Online
- Different dates available
...them safe and finding Zero-day-vulnerabilities are the prime concerns of and Ethical Hacker. Anti-Hacking is more important that just attacking... Learn about: Information Systems, Programming & Data...
- Course
- Online
- Intermediate
- Different dates available
...Testing Footprinting and Reconnaissance Network Scanning Enumeration and Cryptography System Hacking Malware Sniffing Social Engineering Denial of Service... Learn about: Social Engineering, Penetration Testing, Network Scanning...
- Course
- Online
- Intermediate
- Different dates available
- 100h - 1 Year
- Online campus
- Support service
- Virtual classes
...Forensics Lab Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access... Learn about: Social Engineering, Security Manager, Viruses & Worms...
- Course
- Online
- Different dates available
...The CEH Exam Prep is the perfect solution for this challenge, giving readers the solid, in-depth coverage they'll need to score higher on the...
- Training
- Online
- Beginner
- Different dates available
... and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics... Learn about: Wireless Networks, Scanning Networks, Social Engineering...