Skip to content
0

Engineering courses (Engineer training) Professional Certification

We've expanded your search by doing the following:

  • Changed price: from £0 to £100
  • CompTIA PenTest+ (Exam PT0-001) Online Training Course

    Learning 247
    24x7 Online Unlimited Access For 12 Months
    • Online
    • Self-paced
    • Professional certification
    Great service
    ...Windows Accounts 5. Sandboxes Module 11 - Linux Exploits In this module, you will learn how to hack Linux systems. The topics are: 1. Common Linux/Unix-Based Vulnerabilities 2. Password Cracking in Linux 3. Vulnerable Linux Components 4. Linux Accounts Module 12 - Mobile Devices In this …
    £59
  • CompTIA PenTest+ Course

    My Training Academy
    Learn hands-on penetration testing and hacking skills
    • 23 enquiries
    • Online
    • 26 hours · Self-paced
    • Professional certification
    Great service
    ...Engagement Passive Reconnaissance Active Reconnaissance Physical Security Social Engineering Vulnerability Scan Analysis Password Cracking Penetrating Wired Networks Penetrating Wireless Networks Windows Exploits Linux Exploits Mobile Devices Specialised Systems Scripts Application Testing …
    £99
  • Comptia : CompTIA PenTest+

    IT Certify
    CompTIA PenTest+ course with 12 months access from IT Certify
    • 15 enquiries
    • Online
    • 30 hours · Self-paced
    • Professional certification
    Great service
    ...RFID badge cloning Module 5 – Social Engineering In this topic, you will learn about social engineering. The topic is: 1. Social Engineering Attacks • In this topic, you will learn how to execute both technical and non-technical social engineering attacks. • Activities include using …
    £99
  • CompTIA A+ Certification (220-1101 & 220-1102) Online Bundle

    Learning 247
    24x7 Online Unlimited Access For 12 Months
    • 10 students
    • Online
    • 75 hours · Self-paced
    • Professional certification
    Great service
    ...concepts Given a scenario, configure Microsoft Windows networking on a client/desktop Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems Module 2 – Security Summarize the importance of physical security measures Explain logical security …
    £100

FAQs