• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

794 Amazon courses

Online Reputation Management

By OnlineCoursesLearning.com

Online Reputation Management Certification In case you're not kidding about advancing your business, online standing administration is a vital procedure for expanding brand mindfulness. A positive online standing assists individuals with framing a decent assessment on your business and this, thusly, pulls in more rush hour gridlock to your site. Online Reputation Management (ORM) is the way toward observing and building up your computerized presence on the web. This can help you construct trust and validity, which, thus, advances deals and feature your best to imminent clients, who are looking for your items and administrations. Furthermore, monitoring what individuals are saying about your name or business can assist you with distinguishing what's working or not working for your business. What's Covered in the Course? This video seminar on online standing administration incorporates the accompanying points: How online standing is significant, and why you ought to invest energy checking it; Step by step instructions to make a successful online profile that assists individuals with effectively discovering your name on the Internet; how to utilize your name adequately, so your page shows at the highest point of Google rankings; Instructions to screen and build up your standing on LinkedIn, Twitter, YouTube and About Me, by utilizing your name, image and watchwords; Instructions to help your Google positioning with radio syndicated programs and digital recordings on the web; Instructions to make a compelling landing page on your site, and how to utilize pictures, to improve your positioning; How paid exposure can help you support your Google positioning, and how to make a significant Amazon Author Page, for higher believability; Step by step instructions to utilize the Google Keyword Search Tool, to build your online perceivability, and how to diminish the effect of negative audits. This video course offers the accompanying advantages Advantages of examining this seminar on online standing administration include: Boosting traffic and expanding perceivability on the Internet; Higher odds of forthcoming clients discovering your name or business and reaching you; Building higher validity and trust on the web and, consequently, improving brand mindfulness; Killing negative surveys, tattle and hypothesis with positive criticism and boosting your SEO positioning.

Online Reputation Management
Delivered Online On Demand
£50

Earning Money from Home

4.5(3)

By Studyhub UK

Dreaming of ditching the commute and becoming your own boss? Earn Money from Home will equip you with the knowledge and skills to turn that dream into reality. Whether you're a student looking for extra cash or someone seeking a complete career change, this course unveils a treasure trove of opportunities to generate income from the comfort of your home in the UK. Learn about the latest online trends, discover hidden niches, and explore proven methods for building a sustainable work-from-home income stream. Learning Outcomes Gain a comprehensive understanding of various remote work options to earn extra money from home. Identify the most lucrative and in-demand online professions. Develop essential skills for success in the work-from-home environment. Learn practical strategies to monetise your hobbies and talents. Craft a personalised roadmap to achieve your financial goals. Why buy this Earn Money from Home Course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Earning Money from Home there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Earn Money from Home course for? Individuals seeking flexible work arrangements. People looking to supplement their current income. Aspiring entrepreneurs with a passion for online business. Anyone curious about the world of remote work. Those seeking a location-independent career path. Prerequisites This Earning Money from Home does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Earning Money from Home was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Virtual Assistant: £20,000 - £30,000 Per Annum Freelance Writer: £25,000 - £40,000 Per Annum Online Course Creator: Variable (based on sales) Blogger (with Advertising Revenue): Variable (based on traffic) Podcast Host (with Sponsorships): Variable (based on audience) Amazon Seller: Variable (based on product sales) Course Curriculum Earning Money from Home Course Promo 00:03:00 Lesson 1 - Introduction: Making Money From Home 00:03:00 Lesson 2 - Latest Ways to Earn Money Online 00:08:00 Lesson 3 - Work from home jobs for beginners 00:07:00 Lesson 4 - Best Selling Niches for making money online 00:10:00 Lesson 5 - How to make money from an awesome blog 00:08:00 Lesson 6 - How to make money selling online courses 00:09:00 Lesson 7 - How to sell your photos online for more cash 00:06:00 Lesson 8 - How to make money as a freelance writer 00:07:00 Lesson 9 - How to make money from customer service jobs from home 00:06:00 Lesson 10 - How to be a Virtual Assistant and start making income 00:07:00 Lesson 11 - How to make money with a podcast 00:05:00 Lesson 12 - How to make money on Amazon 00:09:00 Lesson 13 - How to make money with transcription jobs 00:05:00 Lesson 14 - How to make money as an online proofreader 00:06:00 Lesson 15 - Making money with membership sites 00:07:00

Earning Money from Home
Delivered Online On Demand1 hour 46 minutes
£10.99

100 JavaScript Algorithms Challenge

By Packt

This video course takes you through the basic and advanced JavaScript methods, enabling you to understand and implement them in a correct way. The course is filled with tips and tricks that will help you tackle tough interview questions to get a job.

100 JavaScript Algorithms Challenge
Delivered Online On Demand7 hours 53 minutes
£101.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Streaming Big Data with Spark Streaming, Scala, and Spark 3!

By Packt

In this course, we will process massive streams of real-time data using Spark Streaming and create Spark applications using the Scala programming language (v2.12). We will also get our hands-on with some real live Twitter data, simulated streams of Apache access logs, and even data used to train machine learning models.

Streaming Big Data with Spark Streaming, Scala, and Spark 3!
Delivered Online On Demand6 hours 21 minutes
£74.99

Achieving Hypergrowth with DevOps OKRs

By IIL Europe Ltd

Achieving Hypergrowth with DevOps OKRs OKRs (Objectives and Key Results) as a framework for defining and tracking objectives and their outcomes is now widely adopted by companies of all sizes, within multiple industries: Google, Adobe, Amazon, Facebook, Dell, Microsoft, Siemens, and Samsung, to name a few. Product OKRs allow for alignment in product development and delivery, Marketing and Sales OKR support driving the buying process via distribution channels, and Customer Service OKRs ensure that customers receive the support they need. All OKRs are important and interdependent in a cascading, objective-setting environment; however, DevOps OKRs play a special role. They boost customer satisfaction, revenue, productivity, and many other key results exponentially, thus allowing a company to achieve the next level of business objectives. In this talk, we will review why this is happening and discuss how to make it happen. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Achieving Hypergrowth with DevOps OKRs
Delivered Online On Demand6 hours
£15

The Project Management Odyssey

By IIL Europe Ltd

The Project Management Odyssey Project Management is composed of many elements. So many, in fact, that it is hard at times to get the big picture. There are more than 100,000 books on Amazon under Project Management. There are three main certification bodies and the latest version of the US standard, PMI's PMBOK® Guide is composed of 5 process groups, 10 knowledge areas and 47 steps. The complexity needs to be simplified. For this presentation, we have gone back to one of the original stories by Homer - the Odyssey. Odysseus and his men were tired after 10 years of fighting and looking forward the journey home. This idea of a journey is at the heart of each and every project. A journey to somewhere else, another place. A beginning, a middle, and an end. We will use this journey to illustrate the correct way to approach any project. In doing so we hope to assist you in retaining the key ingredients for doing projects better in your equally challenging environment. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies.

The Project Management Odyssey
Delivered Online On Demand15 minutes
£10

The Project Management Odyssey

By IIL Europe Ltd

The Project Management Odyssey Project Management is composed of many elements. So many, in fact, that it is hard at times to get the big picture. There are more than 100,000 books on Amazon under Project Management. There are three main certification bodies and the latest version of the US standard, PMI's PMBOK® Guide is composed of 5 process groups, 10 knowledge areas and 47 steps. The complexity needs to be simplified. For this presentation, we have gone back to one of the original stories by Homer - the Odyssey. Odysseus and his men were tired after 10 years of fighting and looking forward the journey home. This idea of a journey is at the heart of each and every project. A journey to somewhere else, another place. A beginning, a middle, and an end. We will use this journey to illustrate the correct way to approach any project. In doing so we hope to assist you in retaining the key ingredients for doing projects better in your equally challenging environment. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies.

The Project Management Odyssey
Delivered Online On Demand30 minutes
£10

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Speech Recognition A-Z with Hands-On

By Packt

Are you intrigued by how speech recognition is driving the growth of the AI market? This course is a reliable guide if you're looking to pursue a career as a speech recognition professional and understand industry best practices.

Speech Recognition A-Z with Hands-On
Delivered Online On Demand5 hours 16 minutes
£93.99