facebook
favorite buttonAdd to Wish List
favorite buttonAdd to Wish List
from350.17QAR/ h

Cybersecurity Job Training, Certification, Accreditation and Placement (Beginner to Advanced)

We are Computer Science Mentors, registered and recognised partners of Cisco and CompTIA in Scotland (UK). We would like to offer a complete Cybersecurity pathway from Beginner to Advanced and a guaranteed Job Offer from within our Cisco Networking Academy, subject to the completion of complete training, certification, and accreditation.

This program is dedicated to empowering professionals with high-demand Cybersecurity skills like Ethical Hacking, Penetration Testing, and System and Network Security. Its goal is to help them not only get specialised training and certification in Cybersecurity but also reach the Cybersecurity Associate level within 16-17 weeks.

This program aims to fill the high-demand gap in Cybersecurity through specialised training, certification and accreditation opportunities and provide Job opportunities for individuals and professionals to step into the lucrative Cybersecurity career and produce a specialised workforce in Cybersecurity to tackle the needs, requirements and expectations of the industry.

The program is based on simple five steps.

• STEP 1: From beginner to advanced level LIVE training in Ethical Hacking and Networking Defense.
• STEP 2: Full instructor-led and LIVE training in CCNA CyberOps.
• STEP 3: Providing Certification venue and opportunities to get certified in CCNA CyberOps (discounted voucher).
• STEP 4: Achieve CyberOps Associate accreditation.
• STEP 5: Receive a confirmed Job offer from Computer Science Mentors.

Location

Online via webcam

General info

Age:
Teenagers (13-17 years old)
Adults (18-64 years old)
Seniors (65+ years old)
Student level:
Beginner
Intermediate
Advanced
Duration:
120 minutes
The class is taught in:English

About Me

I am working as a Lecturer (Assistant Professor) in Cyber Security, in one of a renowned university here in Scotland, the UK. I am associated with the Higher Education Academy (HEA) UK as a full Fellow. Additionally, I am associated with Kingston University London as an External Examiner for their undergraduate courses in Cybersecurity, Digital Forensics, Computer Sciences, and Multimedia Technology. I am also associated with the University of London as a Course Mentor/Tutor for their distance learning/online undergraduate courses in Computer Sciences. I am specialized in Digital Authentication and Security, Command and Control Systems (C2/C3/C4i) Security, and Cloud Computing Hybrid Authentication. I am also the Founder and CEO of Security Essential Scientific Research and Training group (SESRT) in Sydney, Australia. I have earned my PhD in Computer Science with specialization in Cyber Security from University Technology Malaysia (UTM). I am an active member of IEEE, an Academic Initiative member for IBM (UK), Authorized Profile Administrator (APA) for IBM Partner-World (UK), member of American Association of Science and Technology (AASCIT) US, and a member of International Association of Science and Technology for Development (IASTED) Canada. I have collaborations with Cyber Security Group in Coventry University (UK), Pervasive Computing Group in University Technology Malaysia, Artificial Intelligence Center for Advanced System (CAS) and Center of Excellence in Information Assurance (CoEIA) in King Saud University, Saudi Arabia. I am currently supervising Postgraduate (PhD/M.Sc.) students and Undergraduate study project students as their primary supervisor here in UWS. I am also serving as an Editor and Reviewer to many ISI/SCI-E highly ranked Journals and Flagship Conferences.

Education

Postgraduate Certificate in Academic Practice from the University of the West of Scotland (UK), PhD (Computer Sciences) from University Technology Malaysia (Malaysia), and an M.Sc. and Bachelors in Computer Sciences.

Experience / Qualifications

With a PhD in Computer Sciences and more than 16 years of teaching and research experience in Computer Sciences, Software Engineering and Cyber Security, I am a Postgraduate Certified in Academic Practice (UK) and a Full Fellow of Higher Education Academy (UK).

Reviews (2)

Dr. Zeeshan is very clear and easy to understand in his presentation. Knows exactly what your needs are and tailored his lessons to your needs.
The lessons I have taken with Dr Zeeshan have been a great approach to the cybersecurity field, he is always available for help and has a deep knowledge of the things he teach.
This lesson is the fifth lesson of the Web Penetration Testing Series. This lesson consist of the following topics: - Cryptography Overview - Modern Cryptography - Steganography v/s Cryptography - Encoding and Decoding - Symmetric v/s Asymmetric Cryptography - Message Authentication and Hashing This lesson is followed by a two hours practical lab session.
The digital landscape is evolving at an unprecedented rate, and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add-on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do. This Cisco Certified Ethical Hacker course is designed to equip you with an Ethical Hacker skillset and provide a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios. After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyse, and respond to current security threats. **** Module Covered **** + Module 1: Introduction to Ethical Hacking and Penetration Testing + Module 2: Planning and Scoping a Penetration Testing Assessment + Module 3: Information Gathering and Vulnerability Scanning + Module 4: Social Engineering Attacks + Module 5: Exploiting Wired and Wireless Networks + Module 6: Exploiting Application-Based Vulnerabilities + Module 7: Cloud, Mobile, and IoT Security + Module 8: Performing Post-Exploitation Techniques + Module 9: Reporting and Communication + Module 10: Tools and Code Analysis + Final Capstone Activity ** Module Exams: 10 Module Exams ** Final Course Exam: 01 Final Course Exam ** Approximately 70 hours of training.

Ask a question

Send a message explaining your needs and Dr Zeeshan will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"

Availability of a typical week

(GMT -04:00) New York
MonTueWedThuFriSatSun
0
  
  
  
  
  
  
  
1
  
  
  
  
  
  
  
2
  
  
  
  
  
  
  
3
  
  
  
  
  
  Saturday at 3:00
  
4
  
  
  
  
  
  Saturday at 4:00
  
5
  
  
  
  
  
  Saturday at 5:00
  
6
  
  
  
  
  
  Saturday at 6:00
  
7
  
  
  
  
  
  Saturday at 7:00
  
8
  
  
  
  
  
  Saturday at 8:00
  
9
  
  
  
  
  
  Saturday at 9:00
  
10
  
  
  
  
  
  Saturday at 10:00
  
11
  
  
  
  
  
  Saturday at 11:00
  
12
  
  
  
  
  
  Saturday at 12:00
  
13
  Monday at 13:00
  Tuesday at 13:00
  Wednesday at 13:00
  Thursday at 13:00
  Friday at 13:00
  Saturday at 13:00
  
14
  Monday at 14:00
  Tuesday at 14:00
  Wednesday at 14:00
  Thursday at 14:00
  Friday at 14:00
  Saturday at 14:00
  
15
  Monday at 15:00
  Tuesday at 15:00
  Wednesday at 15:00
  Thursday at 15:00
  Friday at 15:00
  Saturday at 15:00
  
16
  Monday at 16:00
  Tuesday at 16:00
  Wednesday at 16:00
  Thursday at 16:00
  Friday at 16:00
  Saturday at 16:00
  
17
  Monday at 17:00
  Tuesday at 17:00
  Wednesday at 17:00
  Thursday at 17:00
  Friday at 17:00
  Saturday at 17:00
  
18
  Monday at 18:00
  Tuesday at 18:00
  Wednesday at 18:00
  Thursday at 18:00
  Friday at 18:00
  Saturday at 18:00
  
19
  
  
  
  
  
  
  
20
  
  
  
  
  
  
  
21
  
  
  
  
  
  
  
22
  
  
  
  
  
  
  
23
  
  
  
  
  
  
  
from 350.17 QAROnline via webcam

Good-fit Instructor Guarantee


If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

Online reputation

  • Instructor since July 2020
  • Phone number verified
  • Google connected

Availability of a typical week

(GMT -04:00) New York
MonTueWedThuFriSatSun
0
  
  
  
  
  
  
  
1
  
  
  
  
  
  
  
2
  
  
  
  
  
  
  
3
  
  
  
  
  
  Saturday at 3:00
  
4
  
  
  
  
  
  Saturday at 4:00
  
5
  
  
  
  
  
  Saturday at 5:00
  
6
  
  
  
  
  
  Saturday at 6:00
  
7
  
  
  
  
  
  Saturday at 7:00
  
8
  
  
  
  
  
  Saturday at 8:00
  
9
  
  
  
  
  
  Saturday at 9:00
  
10
  
  
  
  
  
  Saturday at 10:00
  
11
  
  
  
  
  
  Saturday at 11:00
  
12
  
  
  
  
  
  Saturday at 12:00
  
13
  Monday at 13:00
  Tuesday at 13:00
  Wednesday at 13:00
  Thursday at 13:00
  Friday at 13:00
  Saturday at 13:00
  
14
  Monday at 14:00
  Tuesday at 14:00
  Wednesday at 14:00
  Thursday at 14:00
  Friday at 14:00
  Saturday at 14:00
  
15
  Monday at 15:00
  Tuesday at 15:00
  Wednesday at 15:00
  Thursday at 15:00
  Friday at 15:00
  Saturday at 15:00
  
16
  Monday at 16:00
  Tuesday at 16:00
  Wednesday at 16:00
  Thursday at 16:00
  Friday at 16:00
  Saturday at 16:00
  
17
  Monday at 17:00
  Tuesday at 17:00
  Wednesday at 17:00
  Thursday at 17:00
  Friday at 17:00
  Saturday at 17:00
  
18
  Monday at 18:00
  Tuesday at 18:00
  Wednesday at 18:00
  Thursday at 18:00
  Friday at 18:00
  Saturday at 18:00
  
19
  
  
  
  
  
  
  
20
  
  
  
  
  
  
  
21
  
  
  
  
  
  
  
22
  
  
  
  
  
  
  
23
  
  
  
  
  
  
  
from 350.17 QAROnline via webcam

Good-fit Instructor Guarantee


If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

Share


GCSE & A level Computer Science Revision Sessions.
Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student. I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential. I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years. I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for A level and GCSE. I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.

ENGLISH, ACADEMIC WRITING, INTERNATIONAL LAW AND INTERNATIONAL RELATIONS, SECURITY
Hi there! My name is Gabriela, and I graduated with a Master of Science from Leiden University four years ago. Since then, I've been working in international organizations and recently joined the private sector; my day-to-day work is mostly focused on keeping people safe and secure by analyzing geopolitical, economic, social, legal and security developments globally. My area of expertise is in the fields of Criminology, International Relations, International Law and Security Studies. I also provide tutoring in English for academic purposes (including IELTS prep), intensive writing and research methodologies. I have substantial experience in writing academic research papers on a wide variety of subjects. I am here to help high school students and undergraduates develop their writing and analytical skills and become more confident in their abilities. I am also experienced in teaching English as a second language. My purpose is to motivate and help students solve problems and come up with solutions on their own. I believe that with the right kind of preparation, no subject can be ‘too difficult’. I like seeing students going the extra mile and overcoming obstacles. My teaching method consists of giving students specific guidelines and directions so that they can engage in a learning process and become efficient problem solvers themselves. I see tutoring as the first step towards progress, but I want my students to develop the skills necessary to become successful learners on their own! I also provide teaching support for younger students. I have experience working with children aged 7 to 14 years old. Please feel free to contact me if you need any further information.

Cybersecurity and technology defense as a life skill for all
Cybersecurity involves the practice of protecting computer systems, networks, and data from unauthorized access, damage, or disruption. I specialised in cybersecurity with over 5years experience, education and relevant certifications. I will take you through the technical skills to develop to stay safe in your day-to-day activities. This program is targeted at families, non-IT and non-technical professionals

FIREWALL FORTIGATE ADMINISTRATION #fortinet (NSE4)
This course allows you to acquire the skills necessary to administer FORTIGATE UTM DE FORTINET including profit management antivirus, ips, ids, security policy, dns, dhcp, log, application control, web filter ... eg of other technologies that we will discover later ..

Environment, barrier management, carbon, safety at work, HSE, quality and HSE, sea surface temperature
Standards and procedures relating to environment, health and safety at work; Tissue management (procedures, triads, inventory) Invention of GES Bio-audit Hazardous chemicals, electrical hazards, dangerous pitfalls, hard work hazards The Prime Minister believes

Introduction for C programming, C++, C#, JAVA,JavaScript,Microsoft Azure, Splunk,QRadar
Hello, I'm Pinkal, Trainer and Computer Engineer, I offer computer courses and coaching sessions: - Programming (C, C++, Java, C #, PHP) - Game Development in Unity3D - Supervision of PFE, IT Project and Internship - Assistance in the use of information technologies -Cyber Security (Microsoft defender, Azure, Qradar, Splunk) -IT support (Ticketing system like Remedy, Shield, ServiceNow, Jira) -I have certified Splunk core user and Splunk power user certification. For more info, please contact me

TESOL/TEFL: Intermediate students, including teens {13-17}, adults {18-64} and seniors {65t}
TESOL/TEFL Course Delivery Overview { Intermediate Level} 1: Course Objectives: 2: Improve listening, reading and writing skills 3: Build confidence using English in real life situations 4: Expand vocabulary and refine grammar understanding 5: Encourage communication across age and cultural backgrounds

Information Networks: Concepts and Practical Applications
You can delve into the world of networks with a training course covering fundamental concepts: protocols, configuration, security, and performance optimization. This course is designed for those who want to consolidate their knowledge of information and communications networks. I hold a diploma in engineering from ENIT and have strong experience in network engineering and performance optimization. My goal is to provide you with practical, real-world skills in this area of technology.

Cibersegurança - Sinta-se seguro ao usar o telemóvel / computador (remoto)
Tem receio de ser enganado ou cair nalguma artimanha ao usar dispositivos eletrónicos? Tem receio que acedam à sua conta bancária ou que lhe roubem os seus dados privados? Gostava de reconhecer imediatamente emails, sites e contactos fraudulentos? Gostava de aprender a manter os seus equipamentos protegidos de vírus, ameaças e ataques? Acha que isto é tudo muito complicado para si? Com aulas simples e diretas conseguirá fazer tudo isto rapidamente.

Computer Security Basics - Everything from online banking and investing to email and social media.
Feeling secure online is becoming harder every day. Most people have no idea how vulnerable they are to cyber-attacks that could cost them dearly. There is a mountain of advice on the internet and YouTube, and it's hard to know who to believe when it comes to securing your private information and assets. I can guide you through the weeds so you can feel confident when doing everything from online banking and investing to social media. You will learn how to assign risk levels to everything you do online so you can avoid doing things that will increase your risk level. We are all at risk to some level, and each person has to decide how far they are willing to reasonably go to get the security they require.

The ABC of Industrial Safety for students
The ABC of Industrial Safety is a course that we could describe as a series of essential terms to help students learn to work safely in a work environment. The aim is for participants to be able to recognize the risks and dangers present in the different areas and operations carried out in a company; as well as follow the necessary security measures to minimize these risks.

Online class for CCTV installation & Maintenance on DVR & NVR system
##Course Description : This course prepares candidates for the job role CCTV Technician. A CCTV (closed circuit television) technician works in a central control room, monitoring and controlling a bank of monitoring screens. These are linked to surveillance cameras placed in public places, buildings and places such as construction sites, to detect and prevent crime, and protect people. ##CCTV Basics ,UPS & Energy Conservation CCTV stands for closed-circuit television and is commonly known as video surveillance. “Closed-circuit” means broadcasts are usually transmitted to a limited (closed) number of monitors, unlike “regular” TV, which is broadcast to the public at large. CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses. ## CCTV & Networking Wireless transmission can lower capital and ongoing costs as well as giving you more flexibility and control over your network. It is ideal for re-deployable cameras for events or hotspot areas. Knowledge about the best and most cost-effective solutions on the market of CCTV IP cameras, network switching, video storage and video management software ##Teaching language : English,Hindi,Odia( Please choose your language)

CCNA Tutor - Having 16 years of experience in Netwroking Industry and working with one of corportate company as Netwrok Architect.
You will be learning below topics in order. Network Fundamentals Network IP connectivity IP Services Security Fundamentals Automation & Progrmmability The above topics are like to be included on the 200-301 CCNA exam. The topics are subject to change at any time to reflect the latest technolgies aligned to CISCO's products.

Computer science for students and for people who want to learn more
In this course you will learn things about programming, local networks and office applications. You also have the option of choosing the topic you want to learn and study. For all ages and all types of student courses, we will learn in a fun and easy way.

Coding , project management and cyber security's etc.
Learning a computer language, project management tools, and cybersecurity collectively equips individuals with a comprehensive skill set that is invaluable in the contemporary professional landscape. Proficiency in a computer language enhances problem-solving skills, fostering innovation and efficiency in software development and technology-driven domains. Project management tools contribute to streamlined workflows, efficient resource allocation, and improved communication, ultimately ensuring project success and client satisfaction. Meanwhile, cybersecurity knowledge not only protects against evolving digital threats but also opens doors to diverse career opportunities and cultivates a heightened awareness of personal and organizational security. The synthesis of these skills empowers individuals to navigate the complexities of the digital age, bridging the gap between technical expertise, effective project execution, and robust cybersecurity practices.