Products related to Ethical:
-
Virtues, Democracy, and Online Media : Ethical and Epistemic Issues
This book addresses current threats to citizenship and democratic values posed by the spread of post-truth communication.The contributors apply research on moral, civic, and epistemic virtues to issues involving post-truth culture.The spread of post-truth communication affects ordinary citizens’ commitment to truth and attitudes toward information sources, thereby threatening the promotion of democratic ideals in public debate.The chapters in this volume investigate the importance of helping citizens improve the quality of their online agency and raise awareness of the risks social media poses to democratic values.This book moves from two initial chapters that provide historical background and overview of the present post-truth malaise, through a series of chapters that feature mainly diagnostic accounts of the epistemic and ethical issues we face, to the complexities of virtue-theoretic analyses of specific virtues and vices.Virtues, Democracy, and Online Media will be of interest to scholars and advanced students working in virtue ethics, epistemology, political philosophy, and media studies.
Price: 145.00 £ | Shipping*: 0.00 £ -
Ethical Hacking (Exam ECC 312-50 v10) Online Training Course
Course Description This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the ECC 312-50 version 10 exam, while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows- and Kali Linux-based, covering a broad range of examples used by ethical hackers. In this course, you will learn hands-on penetration testing and hacking skills including: Footprinting, scanning, and enumeration Vulnerability analysis Sniffing and Spoofing Social engineering Denial of Service Web server, web application, and database hacking System hacking using various forms of malware and tools Wireless network and mobile device hacking Evading IDS, Firewalls, and Honeypots Cryptography Cloud computing and Internet of Things hacking The Certified Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques. Instructor: Chrys Thorsen Duration: 32 Hours 57 Minutes Example Training Video (Not From This Course) Course Content The topics in this course cover a broad range of ethical hacking concepts and techniques, and will provide you with a solid foundation to pursue advanced cyber security studies. Module 1 - Introduction to Ethical HackingIn this module, you will learn the basics of ethical hacking. The topics are: 1.1 Information Security Overview1.2 Information Security Threats and Attack Vectors1.3 Hacking Concepts, Types, and Phases1.4 Ethical Hacking Concepts and Scope1.5 Information Security Controls1.6 Penetration Testing Concepts1.7 Information Security Laws and Standards Module 2 - Footprinting and ReconnaissanceIn this module, you will learn how to perform passive intelligence gathering to obtain background information on your target. The topics are: 2.1 Footprinting Concepts2.2 Footprinting Methodology2.3 Footprinting Tools2.4 Footprinting Countermeasures2.5 Footprinting Penetration Testing Module 3 - Network ScanningIn this module, you will learn how to actively scan your targets for open ports, vulnerable services, and other details that can be used to exploit the system. The topics are: 3.1 Scanning Concepts3.2 Discovery Scans3.3 Port Scans3.4 Nmap3.5 Nmap Stealth Scans3.6 Nmap Options3.7 Hping and Other Scanners3.8 SSDP Scanning3.9 Scanning Beyond IDS and Firewall3.10 Banner Grabbing3.11 Scanning Penetration Testing Module 4 - EnumerationIn this module, you will learn how to use different protocols to obtain internal details about users, groups, policies, services, and shared resources on a target. The topics are: 4.1 Enumeration Concepts4.2 NetBIOS Enumeration4.3 SNMP Enumeration4.4 LDAP Enumeration4.5 NTP Enumeration4.6 SMTP and DNS Enumeration4.7 Enumeration Countermeasures4.8 Enumeration Penetration Testing Module 5 - Vulnerability AnalysisIn this module, you will learn how to analyze and rank discovered vulnerabilities. The topics are: 5.1 Vulnerability Assessment Concepts5.2 Vulnerability Assessment Solutions5.3 Vulnerability Scoring Systems5.4 Vulnerability Assessment Tools and Reports Module 6 - Malware ThreatsIn this module, you will learn about malware and how to use it against a target. The topics are: 6.1 Introduction to Malware6.2 Trojan Concepts6.3 Virus and Worm Concepts6.4 Malware Reverse Engineering6.5 Malware Detection6.6 Countermeasures6.7 Anti-malware Software6.8 Malware Penetration Testing Module 7 - SniffingIn this module, you will learn how to sniff and intercept traffic on a network. The topics are:7.1 Sniffing Concepts7.2 DHCP Attacks7.3 MAC Attacks7.4 ARP Poisoning7.5 DNS Poisoning7.7 Sniffing Tools7.8 Countermeasures7.9 Sniffing Detection Techniques7.10 Sniffing Penetration Testing Module 8 - Social EngineeringIn this module, you will learn how to social engineer users. The topics are:8.1 Social Engineering Concepts8.2 Social Engineering Techniques8.3 Impersonation on Social Media Sites8.4 Identity Theft8.5 Social Engineering Countermeasures8.6 Social Engineering Penetration Testing Module 9 - Denial of ServiceIn this module, you will learn how to conduct denial of service attacks. The topics are:9.1 DoS/DDoS Concepts9.2 Common DoS/DDoS Attack Techniques9.3 Additional DoS Attack Types9.4 Botnets9.5 DoS Countermeasures9.6 DoS Penetration Testing Module 10 - Session HijackingIn this module, you will learn how to hijack network sessions. The topics are:10.1 Session Hijacking Concepts10.2 Browser Session Hijacking10.3 Ways to Compromise a Session Token10.4 Client Side Attacks10.5 Session Hijacking at the Network Level10.6 Session Hijacking Tools10.7 Session Hijacking Countermeasures10.8 Session Hijacking Penetration Testing Module 11 - Hacking WebserversIn this module, you will learn how to hack webservers. The topics are:11.1 Webserver Concepts11.2 Webserver Attacks11.3 Methodology of Webserver Attacks11.4 Webserver Attack Tools11.5 Webserver Attack Countermeasures11.6 Webserver Patch Management11.7 Webserver Security Tools11.8 Webserver Pen Testing Module 12 - Hacking Web ApplicationsIn this module, you will learn how to attack web applications. The topics are:12.1 Web Application Concepts12.2 Web App Vulnerabilities and Exploits12.3 Web Application Threats12.4 Injection Attacks12.5 Hidden Fields and Clickjacking12.6 Cross Site Attacks12.7 Additional Web App Attacks12.8 Web App Hacking Methodology12.9 Web App Hacking Countermeasures12.10 Web App Security Tools12.11 Web Application Pen Testing Module 13 - SQL InjectionIn this module, you will learn how to attack databases with SQL injection. The topics are:13.1 SQL Injection Concepts13.2 Types of SQL Injections13.3 SQL Injection Methodology13.4 SQL Injection Tools13.5 SQL Injection Countermeasures Module 14 - Hacking Wireless NetworksIn this module, you will learn how to attack wireless networks. The topics are:14.1 Wireless Concepts14.2 Wireless Discovery and Mapping14.3 Wi-Fi Sniffers14.4 Wi-Fi Attacks14.5 Wi-Fi Cracking14.6 Wireless Hacking Tools14.7 Bluetooth Hacking14.8 Wireless Hacking Countermeasures14.9 Wireless Security Tools14.10 Wireless Penetration Testing Module 15 - System HackingIn this module you will learn about attacking Windows and Linux systems. The topics are:15.1 System Hacking Methodology15.2 Windows System Vulnerabilities and Exploits15.3 Linux System Vulnerabilities and Exploits15.4 Password Cracking Methods15.5 Network Service Password Cracking15.6 Windows Password Cracking15.7 Linux Password Cracking15.8 Password Cracking Tools15.9 Other Methods for Obtaining Passwords15.10 Keylogging15.11 Spyware15.12 Rootkits15.13 Hiding Files15.14 Steganography15.15 Privilege Escalation15.16 Creating and Maintaining Remote Access15.17 Hiding Evidence15.18 System Hacking Penetration Testing Module 16 - Hacking Mobile PlatformsIn this module, you will learn how to attack mobile devices. The topics are:16.1 Mobile Platform Attack Vectors16.2 Hacking Android OS16.3 Rooting Android16.4 Securing Android16.5 Hacking iOS16.6 Jailbreaking iOS16.7 Securing iOS16.8 Hacking Windows Phone OS16.9 Hacking Blackberry16.10 Mobile Device Management16.11 Mobile Security Guidelines and Tools16.12 Mobile Penetration Testing Module 17 - Evading IDS, Firewalls, and HoneypotsIn this module, you will learn how to evade network defense mechanisms. The topics are:17.1 Intrusion Detection17.2 Firewalls17.3 Honeypots17.4 IDS, Firewall, and Honeypot Tools17.5 Evasion17.6 Evasion Countermeasures17.7 IDS/Firewall/ Honeypot Penetration Testing Module 18 - CrytopgraphyIn this module, you will learn how to utilize and attack cryptographic technologies. The topics are:18.1 Cryptography Concepts18.2 Encryption Algorithms18.3 Cryptography Tools18.4 Public Key Infrastructure (PKI)18.5 Email Encryption18.6 Disk Encryption18.7 Cryptography Attacks18.8 Cryptography Penetration Testing Module 19 - Cloud ComputingIn this module, you will learn how to attack computer cloud systems. The topics are:19.1 Introduction to Cloud Computing19.2 Virtualization19.3 Cloud Computing Threats19.4 Countermeasures to Cloud Computing Threats19.5 Cloud Computing Attacks19.6 Cloud Security19.7 Cloud Security Best Practices19.8 Cloud Penetration Testing Module 20 - IoT HackingIn this module, you will learn how to attack the Internet of Things. The topics are:20.1 IoT Concepts20.2 IoT Vulnerabilities and Attacks20.3 IoT Hacking Methodology and Tools20.4 IoT Hacking Countermeasures20.5 IoT Penetration Testing LEARN365 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes andamp; Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Social Learning andamp; Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. Flash Cards andamp; Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high. Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
Price: 79.00 £ | Shipping*: £ -
The Privacy Mission : Achieving Ethical Data for Our Lives Online
Future-proof yourself and your organization against known threats to privacy and online safety The subject of data ethics has never been more urgent.This is no longer an academic or niche geek issue as it has been since the inception of the internet and the world wide web.Data ethics is an issue that affects all of us now as our personal and professional lives increasingly take place online. Who controls access to the hardware, who runs the software, who can spy on us, hack us, data farm us?What are the threats that we need to mitigate against democratically, societally, and personally?How can corporations protect us and how can that help their bottom line?The Privacy Mission aims to answer these questions and summarise both the overarching concepts and principles about why data ethics is important.It offers practical solutions for companies, policy makers and individuals to push back against known threats and future proof themselves going forward.
Price: 29.99 £ | Shipping*: 0.00 £ -
Star Trek Online Digital Download
This product is a brand new and unused Star Trek Online Digital Download
Price: 8.31 € | Shipping*: 0.00 €
-
What are ethical persons?
Ethical persons are individuals who consistently make decisions and take actions that are morally right and just. They adhere to a set of principles and values that guide their behavior, and they strive to treat others with respect, fairness, and honesty. Ethical persons also take responsibility for their actions and consider the potential impact of their choices on others and the world around them. Overall, ethical persons are committed to upholding high standards of integrity and morality in their personal and professional lives.
-
What are ethical individuals?
Ethical individuals are those who consistently make decisions and take actions that align with moral principles and values. They prioritize honesty, integrity, fairness, and compassion in their interactions with others. Ethical individuals also consider the impact of their choices on others and strive to do what is right, even when it may be challenging or unpopular. Overall, ethical individuals demonstrate a strong sense of personal responsibility and a commitment to upholding ethical standards in all aspects of their lives.
-
What are ethical reasons?
Ethical reasons refer to the moral principles and values that guide our behavior and decision-making. These reasons are based on the concept of right and wrong, and they help us determine what is morally acceptable or unacceptable in a given situation. Ethical reasons are often influenced by cultural, religious, and personal beliefs, and they play a crucial role in shaping our actions and interactions with others. Ultimately, ethical reasons help us to uphold integrity, fairness, and respect in our relationships and society.
-
What is ethical universalism?
Ethical universalism is the belief that there are fundamental ethical principles that apply universally to all people, regardless of their culture, religion, or background. This perspective holds that certain moral values, such as honesty, fairness, and respect for others, are inherent and should be upheld by all individuals and societies. Ethical universalism emphasizes the importance of recognizing and respecting the common humanity and dignity of all people, and it promotes the idea that ethical standards should be consistent across different cultures and contexts.
Similar search terms for Ethical:
-
LEGO Minifigures Online Key (Digital Download)
This product is a brand new and unused LEGO Minifigures Online CD Key (Digital Download)
Price: 0.76 € | Shipping*: 0.00 € -
EvE Online: Inferno Digital Download Key
This product is a brand new and unused EvE Online: Inferno Digital Download Key
Price: 15.47 € | Shipping*: 0.00 € -
Age Verification CPD Accredited Online Course
Course Description There is a lawful requirement for every licensed premises to make sure that they have an age verification policy relating to the supply of alcohol on their premises. This online age verification training course enables you to complete the legal requirement by providing you with a “model age verification policy” and by detailing each of the procedures you need to follow in order to verify the age and I.D. of younger and younger looking customers. Benefits Improve your career prospects. Learn valuable knowledge, skills, advice and guidance to help you achieve success. Study online from anywhere. Study at your own pace. Download and print your industry recognised certificate on successful completion. Who can take the course?Anyone who has an interest in learning more about this subject matter is encouraged to take the course. There are no entry requirements. You get 2 months to complete the course. What is the structure of the course?The course is broken down into bite-sized modules. You're free to spend as much or as little time as you feel necessary on each section, simply log in and out of the course at your convenience. Where / when can I study the course?You can study the course any time you like. Simply log in and out of the web-based course as often as you require. The course is compatible with all computers and most tablet devices etc. so you can even study while on the move! As long as you have access to the internet, you should be able to study anywhere that's convenient. Is there a test at the end of the course?Once you have completed all the modules there is a multiple choice test. The questions will be on a range of topics found within the modules. The test, like the course, is online and can be taken at a time and location of your choosing. What if I don't pass the test?If you don’t pass the test first time then you will get further opportunities to take the test again after extra study. There are no limits to the number of times you can take the test. All test retakes are included within the price of the course. When will I receive my certificate?Once you have completed your test you can log in to your account and download/print your certificate any time you need it. How long does it take to complete the course?We estimate that the entire program is likely to take around 2-4 hours to work through initially, but you may want to allow more time to repeat some areas. You should allow an additional 30 minutes for the end of course test. LEARNING OUTCOMES Current law on age verification for alcohol sales How to go about challenging for proof of age Exactly what a policy on age verification should say How to make the decision to ask for proof of age Explaining why you are asking for a proof of age Identifying which proofs of age are and are not acceptable Some common conflict scenarios Procedures for putting the policy into practice Refusing a proxy sale of alcohol How you should deal with an angry or abusive customer who won’t take no for an answer Techniques to adopt if the customer won’t accept a refusal to serve Your exit from a high-risk situation The consequences for failing to implement a policy on age verification for the sale of alcohol. Courses Include 2 Months Online Access to:Expert Online Training: Our courses use only the industry’s finest instructors. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.Navigation and Controls: These self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
Price: 9.00 £ | Shipping*: £ -
Verification of Death CPD Accredited Online Course
Course Description This learning resource is aimed at nurses working in primary care, supportive care and care homes. It will support the development of your knowledge and skill to competently verify death of adults. It is not limited to any particular setting or situation, but enables the nurse to understand the procedure to verify death within the contexts of both expected and unexpected death (and the particular considerations for both situations) Benefits Improve your career prospects. Learn valuable knowledge, skills, advice and guidance to help you achieve success. Study online from anywhere. Study at your own pace. Download and print your industry recognised certificate on successful completion. Who can take the course?Anyone who has an interest in learning more about this subject matter is encouraged to take the course. There are no entry requirements. What is the structure of the course?The course is broken down into bite-sized modules. You're free to spend as much or as little time as you feel necessary on each section, simply log in and out of the course at your convenience. Where / when can I study the course?You can study the course any time you like. Simply log in and out of the web-based course as often as you require. The course is compatible with all computers and most tablet devices etc. so you can even study while on the move! As long as you have access to the internet, you should be able to study anywhere that's convenient. Is there a test at the end of the course?Once you have completed all the modules there is a multiple choice test. The questions will be on a range of topics found within the modules. The test, like the course, is online and can be taken at a time and location of your choosing. What if I don't pass the test?If you don’t pass the test first time then you will get further opportunities to take the test again after extra study. There are no limits to the number of times you can take the test. All test retakes are included within the price of the course. When will I receive my certificate?Once you have completed your test you can log in to your account and download/print your certificate any time you need it. How long does it take to complete the course?We estimate that the entire program is likely to take around 2-4 hours to work through initially, but you may want to allow more time to repeat some areas. You should allow an additional 30 minutes for the end of course test. LEARNING OUTCOMES Understand the legal and professional context related to death verification and certification Differentiate between an expected and an unexpected death, and any policies or procedures related to these Develop knowledge, skill and competence to sensitively perform verification of death Courses Include 12 Months Unlimited Online Access to:Expert Online Training: Our courses use only the industry’s finest instructors. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.Navigation and Controls: These self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
Price: 9.00 £ | Shipping*: £
-
What are ethical considerations?
Ethical considerations refer to the moral principles and values that guide decision-making and behavior in a particular context. In research, ethical considerations involve ensuring the well-being and rights of participants, obtaining informed consent, and maintaining confidentiality. In business, ethical considerations may involve treating employees and customers fairly, being transparent in business practices, and considering the impact of business decisions on society and the environment. Overall, ethical considerations involve making decisions and taking actions that are morally right and just.
-
What are ethical issues?
Ethical issues are dilemmas or conflicts that arise when there is a clash between moral principles, values, and responsibilities. These issues often involve questions about what is right or wrong, fair or unfair, and just or unjust. Ethical issues can arise in various contexts, such as in business, healthcare, technology, and the environment, and they require careful consideration and decision-making to navigate the complexities of moral and ethical concerns. Resolving ethical issues often involves balancing competing interests and finding solutions that align with ethical principles and standards.
-
What is ethical conditioning?
Ethical conditioning refers to the process of instilling moral values, principles, and beliefs in individuals through socialization, education, and cultural influences. It involves shaping an individual's understanding of right and wrong, and guiding their behavior towards ethical decision-making. Ethical conditioning can be influenced by various factors such as family, religion, education, and societal norms, and plays a crucial role in shaping an individual's moral compass and ethical behavior. It is essential for promoting a just and harmonious society, and for fostering a sense of responsibility and accountability in individuals.
-
What are the ethical differences?
The ethical differences refer to the distinctions in moral principles, values, and behaviors between individuals, groups, or cultures. These differences can arise from varying beliefs, traditions, and societal norms, leading to contrasting perspectives on what is considered right or wrong. Ethical differences can impact decision-making, interpersonal relationships, and societal dynamics, and it is important to recognize and respect these differences in order to promote understanding and cooperation among diverse individuals and communities.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.