Skip to content

IT : IT Training Beginner to Intermediate

Free eCertificate | Unlimited time | Tutor Support | Video Lessons


Frontier Education

Summary

Price
£12 inc VAT
Study method
Online, On Demand What's this?
Duration
19.8 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free
Additional info
  • Tutor is available to students

13 students purchased this course

Add to basket or enquire

Overview

This IT training course enables you to delve deeply into IT, to better explore, understand and apply relevant skills.

Through this IT Training course, you will gain a world-class knowledge and understanding with a focus on IT Training, based on solving real-life issues.

This IT Training course includes a whole host of practical tips and advice, helping you to develop your IT Training skills to become the IT professional, manager, training and development officer, or related profession you can be.

This IT training course is intended for anyone with an interest in IT Training and it does not require any previous expertise or knowledge of IT Training . We will explore the key ideas, models, and findings of the main IT theories.

Whether you’re a newcomer in IT or already have an established role within your company, this IT Training course can provide you with the digital IT education you need to help your IT career or organisation thrive.

Whether you’ve been tinkering with IT for your business already or are completely new to the field of IT Training, you’ve come to the right place. This IT Training course, developed by experts, includes an industry-relevant curriculum designed to prepare you for a role in IT.

This IT Training course was designed to give you the tools and strategies you need to create a measurable impact in your career — whether your impact goal is to get a job, to enhance skills, or to make a positive difference in some other way.

This is four courses bundle and they are:

Course 1: Learn Ethical Hacking From A-Z - Beginner To Expert Course

Course 2: Microsoft Excel

Course 3: Microsoft Access

Course 4: Computer Networks Security from Scratch to Advanced

Packed with videos, PDFs and exercises, it'll equip you with what it takes to be successful in today’s business landscape, covering a broad range of topics, including the current cybersecurity market, the 3 types of hackers, common methods of hacking, common methods of hacking and much more.

Frontier Education provides those with no previous experience or working professionals with trailblazing, practice-based teaching, aimed to inspire and prepare you for a career in IT.

Benefits of taking IT course with Frontier Education:

  • Learner support via live chat after starting IT Training course
  • Dedicated tutor support from Monday to Friday with your IT Training course
  • After completion of IT Training course you will receive Free certificate of completion
  • You can access this IT training course on your mobile, desktop or laptop from anywhere with internet access.

Curriculum

26
sections
158
lectures
19h 49m
total
    • 1: 1. Course Overview 08:23
    • 2: 2. About Your Instructors 02:32
    • 3: 3. Section Overview 03:21
    • 4: 4. Current Cybersecurity Market 08:39
    • 5: 5. The 3 Types of Hackers 04:51
    • 6: 6. The 4 Elements of Security 04:06
    • 7: 7. Ethical Hacking Terminology 03:45
    • 8: 8. Common Methods of Hacking 07:52
    • 9: 9. Cyber Security _ Ethical Hacking Overview 02:31
    • 10: 10. Ethical Hacking vs Pentration Testing 05:58
    • 11: 11. Jobs Opportunities in Cybersecurity 01:26
    • 12: 12. Who_s This Course For 01:16
    • 13: 1. Networking Section Overview 11:57
    • 14: 2. How Data Travels Across The Internet 01:40
    • 15: 3. Understanding Ports and Protocols 08:23
    • 16: 4. Public _ Private IP_s Overview 02:14
    • 17: 5. What Are Subnets 02:58
    • 18: 6. The Average Network vs Remote Based 05:34
    • 19: 1. Hacking Lab Section Overview 08:43
    • 20: 2. Understanding Virtual Machines 03:23
    • 21: 3. Setup Your Kali Linux Machine 09:33
    • 22: 4. VN Setup _ Testing Vulnerable Systems 23:10
    • 23: 1. Linux+Python+Bash+Powershell Basics Overview 05:39
    • 24: 2. Linux Basics 10:35
    • 25: 3. Working With Directories _ Moving Files 02:46
    • 26: 4. Installing _ Updating App Files 02:03
    • 27: 5. Linux Text Editors 04:29
    • 28: 6. Searching For Files 02:17
    • 29: 7. Bash Scripting 09:02
    • 30: 8. Python Basics 10:39
    • 31: 1. Remaining Anonymous Section Overview 06:02
    • 32: 2. TOR Browser Overview 05:31
    • 33: 3. Anonsurf Overview 03:16
    • 34: 4. Changing Mac Addresses 02:43
    • 35: 5. Using a Virtual Private Network & Server (VPN, VPS) 04:20
    • 36: 1. WiFi Hacking Section Overview 05:40
    • 37: 2. Wifi Hacking System Setup 09:28
    • 38: 3. WEP Hacking Attack #1 08:32
    • 39: 4. WEP Hacking Attack #2 04:26
    • 40: 5. WPA _ WPA2 Hacking 10:21
    • 41: 1. Reconnaissance Section Overview 03:58
    • 42: 2. Passive + Active Recon 01:12
    • 43: 3. Recon-ng Overview 14:52
    • 44: 4. Whois Enum 02:00
    • 45: 5. DNS Enumeration Overview 02:08
    • 46: 6. Netcraft DNS Information 02:31
    • 47: 7. Google Hacking Overview 04:49
    • 48: 8. Shodan.io Overview 02:13
    • 49: 9. Securityheaders.com (Analyze HTTPS Headers of website) 01:45
    • 50: 10. Ssllabs.comssltest (Look for SSL issues on website) 02:06
    • 51: 11. Pastebin.com (Sensitive Information) 00:59
    • 52: 13. Netcat Overview + SMB _ NFS Enumeration 14:07
    • 53: 14. Nikto _ Sparta Web Application Scanner 05:30
    • 54: 15. SMPT Enumeration + Nessus +Openvas Scanners 04:31
    • 55: 1. Launching Attacks Overview 10:19
    • 56: 2. Analyzing Information Gathered 03:30
    • 57: 3. Taking Advantage of Telenet 06:02
    • 58: 4. Searching _ Understanding Exploits 05:46
    • 59: 5. Copy Exploits From Searchsploit 02:52
    • 60: 6. Understanding Exploits 04:26
    • 61: 7. Launching Exploits 24:27
    • 62: 8. Brute Force Attacks 06:53
    • 63: 9. How To Crack Passwords 04:13
    • 64: 10. ARP Spoofing Overview 21:27
    • 65: 11. Introduction To Cryptography 13:30
    • 66: 1. Post Exploitation Section Overview 03:08
    • 67: 2. Privledge Escalation 29:01
    • 68: 3. Transferring Files Within Victim, Creating Custom Malware +Evading AV 27:23
    • 69: 4. Installing a Keylogger 02:33
    • 70: 5. Installing a Backdoor 06:31
    • 71: 1. Website _ Web App Hacking Overview 06:08
    • 72: 2. Web Application Scanning 07:52
    • 73: 3. Directory Buster Hacking Tool 02:49
    • 74: 4. Nikto Web App Hacking Tool 03:27
    • 75: 5. SQLmap and SQL Ninja Overview 00:46
    • 76: 6. How To Execute Brute Force Attacks 13:21
    • 77: 7. Using Command Injection 03:21
    • 78: 8. Malicious File Uploads 10:27
    • 79: 9. Local _ Remote File Inclusion 10:12
    • 80: 10. SQL Injection 18:32
    • 81: 11. Using Cross Site Forgery 10:58
    • 82: 12. Cross Site Scripting Overview 12:26
    • 83: 1. Mobile Phone Hacking Section Overview 10:31
    • 84: 2. Mobile Attack Vectors 01:57
    • 85: 3. Mobile Hacking with URL_s 02:03
    • 86: 4. Jail Breaking and Rooting Considerations 00:56
    • 87: 5. Privacy Issues (Geo Location) 00:54
    • 88: 6. Mobile Phone Data Security 02:29
    • 89: 1. Getting Your Name Out There Section Overview 02:09
    • 90: 2. Building A Brand 09:13
    • 91: 3. Personal Branding 13:19
    • 92: 4. Setup Your Website and Blog 11:27
    • 93: 5. Writing a Book 09:52
    • 94: 6. Starting a Podcast 08:14
    • 95: 7. Networking Overview 06:21
    • 96: 1. Making Money Section Overview 01:51
    • 97: 2. Bug Bounty Programs 04:23
    • 98: 3. How To Start Freelancing 10:44
    • 99: 4. How To Start Client Consulting 09:07
    • 100: 1. Potential Salary & Cybersecurity Roadmap 10:26
    • 101: 2. Book Recomendations 02:33
    • 102: 3. Places to Practice Hacking for Free 03:15
    • 103: Section+3+Resources 01:00 PDF
    • 104: Section+4+Resources (1) 02:00 PDF
    • 105: Section+5+Resources 01:00 PDF
    • 106: Section+6+Resources 01:00 PDF
    • 107: Section+9+Resources 01:00 PDF
    • 108: Intro 09:57
    • 109: Sec1 Lec1 10:30
    • 110: Sec1 Lec2 11:06
    • 111: Sec1 Lec3 09:47
    • 112: Sec1 Lec4 10:39
    • 113: Sec1 Lec5 09:20
    • 114: Sec2 Lec1 09:57
    • 115: Sec2 Lec2 11:50
    • 116: Sec2 Lec3 10:47
    • 117: Sec2 Lec4 08:33
    • 118: Sec2 Lec5 10:04
    • 119: Sec3 Lec1 10:41
    • 120: Sec3 Lec2 12:53
    • 121: Sec3 Lec3 12:28
    • 122: Sec3 Lec4 11:37
    • 123: Sec3 Lec5 10:39
    • 124: Sec4 Lec1 09:19
    • 125: Sec4 Lec2 12:15
    • 126: Sec4 Lec3 06:47
    • 127: Sec4 Lec4 10:28
    • 128: Sec4 Lec5 09:24
    • 129: Sec5 Lec1 08:53
    • 130: Sec5 Lec2 10:07
    • 131: Sec5 Lec3 11:50
    • 132: Sec5 Lec4 11:15
    • 133: Sec5 Lec5 10:18
    • 134: Sec6 Lec1 12:49
    • 135: Sec6 Lec2 10:32
    • 136: Sec6 Lec3 08:34
    • 137: Sec6 Lec4 06:42
    • 138: Sec6 Lec5 08:01
    • 139: Sec7 Lec1 11:17
    • 140: Sec7 Lec2 06:09
    • 141: Sec7 Lec3 08:56
    • 142: Sec7 Lec4 08:20
    • 143: Sec7 Lec5 07:22
    • 144: Sec8 Lec1 10:41
    • 145: Sec8 Lec2 08:31
    • 146: Sec8 Lec3 08:39
    • 147: Sec8 Lec4 09:09
    • 148: Sec8 Lec5 08:42
    • 149: Sec9 Lec1 10:46
    • 150: Sec9 Lec2 10:50
    • 151: Sec9 Lec3 07:18
    • 152: Sec9 Lec4 05:41
    • 153: Sec9 Lec5 13:50
    • 154: Sec10 Lec1 06:10
    • 155: Sec10 Lec2 04:10
    • 156: Sec10 Lec3 05:37
    • 157: Sec10 Lec4 08:47
    • 158: Sec10 Lec5 06:18

Course media

Description

In this IT Training course, you will learn and understand the core theories and practices in IT Training, developing a solid base of knowledge.You will understand core IT Training theories and practices and be able to think critically, actively contributing towards the body of knowledge in the industry and pushing the boundaries with IT Training skills.

With expert guidance and a combination of videos, PDFs, and worksheets, this course is designed to prepare you for a career or learning journey.

Course curriculum:

Course 1: Learn Ethical Hacking From A-Z - Beginner To Expert Course

Course 2: Microsoft Excel

Course 3: Microsoft Access

Course 4: Computer Networks Security from Scratch to Advanced

Section One: Introduction to Computer Networks

  • Lecture 1: IT:What is a Computer Network?
  • Lecture 2: IT:Computer Networks Topologies
  • Lecture 3: IT:Computer Networks Categories
  • Lecture 4: IT:Computer Networks Devices and Services
  • Lecture 5: IT:Computer Networks Transmission Media

Section Two: ISO/OSI Model (7 Layers)

  • Lecture 1: IT:Why ISO/OSI Model?
  • Lecture 2: IT:Application, Presentation, and Session Layers
  • Lecture 3: IT:Transport and Network Layers
  • Lecture 4: IT:Data Link and Physical Layers
  • Lecture 5: IT:ISO/OSI Model in Action

Section Three: TCP/IP Protocol Suite

  • Lecture 1: IT:Introduction to Computer Networks Protocols
  • Lecture 2: IT:IP Protocol
  • Lecture 3: IT:TCP and UDP Protocols
  • Lecture 4: IT:Application Protocols
  • Lecture 5: IT:TCP/IP Characteristics and Tools

Section Four: Wireless Networks

  • Lecture 1: IT:Wireless Networks Benefits
  • Lecture 2: IT:Wireless Networks Types
  • Lecture 3: IT:Wireless Networks Protocol (Wi-Fi)
  • Lecture 4: IT:Wireless Networks Devices
  • Lecture 5: IT:Wireless Networks Drawbacks

Section Five: Computer Networks Security

  • Lecture 1: IT:Security Goals
  • Lecture 2: IT:Securing the Network Design
  • Lecture 3: IT:TCP/IP Security and Tools
  • Lecture 4: IT:Port Scanning and Tools
  • Lecture 5: IT:Sniffing and Tools

Section Six: Firewalls and Honeypots

  • Lecture 1: IT:Why Using a Firewall?
  • Lecture 2: IT:Firewalls Rules
  • Lecture 3: IT:Firewalls Filtering
  • Lecture 4: IT:Honey Pots
  • Lecture 5: IT:Bypassing Firewalls

Section Seven: Intrusion Detection and Prevention systems (IDS/IPS)

  • Lecture 1: IT:What is Intrusion Detection Systems (IDS)?
  • Lecture 2: IT:Network IDS (NIDS)
  • Lecture 3: IT:NIDS Challenges
  • Lecture 4: IT:Snort as NIDS
  • Lecture 5: IT:Intrusion Prevention Systems (IPS)

Section Eight: Wireless Networks Security

  • Lecture 1: IT:Wired Equivalent Privacy WEP Attacking
  • Lecture 2: IT:WPA and AES Protocols
  • Lecture 3: IT:Wireless Security Misconceptions
  • Lecture 4: IT:Wireless Attacks and Mitigation
  • Lecture 5: IT:Secure Network Design with Wireless

Section Nine: Physical Security & Incident Handling

  • Lecture 1: IT:Physical Security Objectives
  • Lecture 2: IT:Physical Threats and Mitigation
  • Lecture 3: IT:Defence in Depth (DiD)
  • Lecture 4: IT:What is an Incident?
  • Lecture 5: IT:Incident Handling

Section Ten: Computer Networks Security Conclusion

  • Lecture 1: IT:Confidentiality, Integrity, and Availability (CIA)
  • Lecture 2: IT:Assets, Threats, and Vulnerabilities
  • Lecture 3: IT:Risks and Network Intrusion
  • Lecture 4: IT:Common Attacks
  • Lecture 5: IT:Security Recommendations

You’ll also be able to access a number of exclusive bonus resources to help you along your IT Training journey, including:

  • Setting up your hacking lab
  • Linux+python+bash+power shell basics
  • How to hack wifi
  • Mobile phone hacking security
  • How to make money as an ethical hacker

Top reasons to Study Online at Frontier Education

  • Tailor-made: Course adapted to market needs and interests
  • Flexible programs: study and work at your own pace on easy-to-use web platforms
  • Online education: progressive teaching methods with video or easy to understanding the medium
  • Multicultural: connect with classmates from all corners of the globe

Who is this course for?

IT Training enables to undertake new and different tasks - this can lead to job enhancements, promotion and increased motivation and job satisfaction. helps to gain confidence in their use of IT - this can increase their productivity and efficiency.

This IT Training for anyone looking to develop their skills and knowledge in IT, as well as people wants to progress their career into a IT professional

  1. Anyone wants to enhance IT (ICT) skills and knowledge,
  2. Anyone wants to use IT (ICT) in his career or profession,
  3. Anyone need IT (ICT) skills for new job application and opportunities,
  4. Wants to learn IT (ICT) and apply in real life,
  5. Wants to demonstrate IT (ICT) to prospective employer or job,
  6. Anyone wants apply IT (ICT) skills and dive into relevant career path

It course also is for those wants to

  • Improved organisational agility using IT (ICT) .
  • Better and faster decision making with knowledge of IT (ICT).
  • Quicker problem-solving using IT (ICT).

Requirements

There are no prerequisites to start this IT course but it would be beneficial for candidates to have internet in IT and basic knowledge of the English.Candidates with no prior IT knowledge or skills can start this IT course and get ready for IT tasks and responsibilities.

Career path

This IT course helps you to demonstrate IT skills and knowledge to prospective employer or apply in real life.

Prospective IT careers paths include but not limited to

  • IT Customer Support
  • IT Manager
  • IT Support Manager
  • IT Support Associate
  • IT Support Technician
  • IT Support Specialist
  • IT Technical Support Engineer
  • IT Technician

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.