Skip to content
6

Advanced Powershell courses

Search results

    • Online
    • Self-paced
    • Certificate(s) included
    Great service
    ...11: Managing SQL Server with Windows PowerShell 11.1 Managing SQL Server with Windows PowerShell 11.2 Windows PowerShell Lab Module 12: Replicating Data 12.1 Replicating Data Part 1 12.2 Replicating Data Part 2 12.3 Replicating Data Part 3 Why My Training Academy? My …
    £195
  • IT Security Professional Training: Ethical Hacking, AWS & Cyber Defense

    Learndrive
    An Extensive IT Security Course Covering Ethical Hacking and AWS Cloud | CPD Accredited | Free Certificate
    • Online
    • 33.4 hours · Self-paced
    • Certificate(s) included
    • Tutor support
    Great service
    ...is the fact that it protects all types of data from theft and damage. The threat targets include sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information …
    Save 23%
    £19 £24.99
  • Ethical Hacking Job Preparation Complete Course

    Cambridge Open Academy
    Big Sale Event | 20-in-1 Course | Updated 2025 | FREE PDF & Hardcopy Certificate | Lifetime Access | 1K+ Enrolment
    • Online
    • 60 hours · Self-paced
    • Certificate(s) included
    • 200 CPD points
    • Tutor support
    Great service
    ...Course 08: CompTIA Security+ (SY0-601) » Course 09: CompTIA A+ (220-1001) » Course 10: CompTIA A+ (220-1002) Technical Skills: » Course 11: Data Analysis » Course 12: Digital Marketing » Course 13: IT Support Management Soft Skills: » Course 14: Negotiation » Course 15: Public Speaking …
    £399
  • Ethical Hacking & Penetration Testing Career Programme

    Oak Academy
    Master Offensive Security, Real-World Attacks & Professional Defense Techniques
    • Online
    • 51 hours · Self-paced
    • Certificate(s) included
    • Tutor support
    ...for Event Anomalies OtherLogs-SIEM Continuous Monitoring Basic Terms of Networking Reference Models TCP/IP (Networking) Basics OSI Reference Model vs. TCP/IP Reference Model Layer 2 - Data Link Layer Layer 2: Ethernet - Principles, Frames & Headers Layer 2: Analysing ARP Packets …
    £999
  • Full Ethical Hacking & Penetration Testing Course | Ethical

    Oak Academy
    Ethical Hacking is in demand. Learn Ethical Hacking penetration testing, web hacking, Metasploit & become ethical hacker
    • Online
    • 30.4 hours · Self-paced
    • Certificate(s) included
    ...Technologies such as HTML, HTTP, Document Object Model and so on, To Gather Information About the Target and Use This Information to Model an Attack. User Management Issues. Exposing The Session Management Problems. Data Validation Wardriving with Kismet, Mapping …
    £49
  • Complete Ethical Hacking and Penetration Testing Course

    Oak Academy
    Ethical Hacking course includes Web Hacking, Phishing, NMAP, Password Cracking, Penetration Testing, Metasploit &more
    • Online
    • 27.4 hours · Self-paced
    • Certificate(s) included
    ...the Hash Preparation Pass the Hash Gathering Some Hashes Pass the Hash Try Other Assets Collecting Sensitive Data in Post-Exploitation Phase Collecting Sensitive Data - Some Real World Examples Introduction to Password Cracking Password Hashes of Windows Systems Password Hashes …
    £49

FAQs