• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

802 Amazon courses

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

The Project Management Odyssey

By IIL Europe Ltd

The Project Management Odyssey Project Management is composed of many elements. So many, in fact, that it is hard at times to get the big picture. There are more than 100,000 books on Amazon under Project Management. There are three main certification bodies and the latest version of the US standard, PMI's PMBOK® Guide is composed of 5 process groups, 10 knowledge areas and 47 steps. The complexity needs to be simplified. For this presentation, we have gone back to one of the original stories by Homer - the Odyssey. Odysseus and his men were tired after 10 years of fighting and looking forward the journey home. This idea of a journey is at the heart of each and every project. A journey to somewhere else, another place. A beginning, a middle, and an end. We will use this journey to illustrate the correct way to approach any project. In doing so we hope to assist you in retaining the key ingredients for doing projects better in your equally challenging environment. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies.

The Project Management Odyssey
Delivered Online On Demand15 minutes
£10

The Project Management Odyssey

By IIL Europe Ltd

The Project Management Odyssey Project Management is composed of many elements. So many, in fact, that it is hard at times to get the big picture. There are more than 100,000 books on Amazon under Project Management. There are three main certification bodies and the latest version of the US standard, PMI's PMBOK® Guide is composed of 5 process groups, 10 knowledge areas and 47 steps. The complexity needs to be simplified. For this presentation, we have gone back to one of the original stories by Homer - the Odyssey. Odysseus and his men were tired after 10 years of fighting and looking forward the journey home. This idea of a journey is at the heart of each and every project. A journey to somewhere else, another place. A beginning, a middle, and an end. We will use this journey to illustrate the correct way to approach any project. In doing so we hope to assist you in retaining the key ingredients for doing projects better in your equally challenging environment. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies.

The Project Management Odyssey
Delivered Online On Demand30 minutes
£10

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Speech Recognition A-Z with Hands-On

By Packt

Are you intrigued by how speech recognition is driving the growth of the AI market? This course is a reliable guide if you're looking to pursue a career as a speech recognition professional and understand industry best practices.

Speech Recognition A-Z with Hands-On
Delivered Online On Demand5 hours 16 minutes
£93.99

Affiliate Marketing Extended Diploma

By iStudy UK

When it comes to business online, one of the simplest and most productive methods is through Affiliate Marketing. This is because becoming an affiliate marketer doesn't require any experience, nor website it requires simple promotional methods that will convert prospective buyers into customers. In this course, we will cover the basics of affiliate marketing to give you an idea of where to start, how to start and what websites are good to work with. We will then move into how to become a profitable affiliate in 60 days or less, becoming an affiliate insider and some advanced techniques that if applied correctly will take your earnings to the next level. By the end of this course, you will be able to implement a concrete plan that will get you into earning money quickly and easily. Course Highlights Affiliate Marketing Extended Diploma is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Affiliate Marketing Extended Diploma into 45 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 10 hours, 9 minutes and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Affiliate Marketing Extended Diploma Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Affiliate Marketing Extended Diploma is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Affiliate Marketing Extended Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Affiliate Marketing Extended Diploma (Updated Version) Module 01: Affiliate Marketing Passive Income Made Easy Affiliate Marketing Passive Income Made Easy Preview 00:06:00 Reasons to Consider Affiliate Marketing 00:06:00 Ways You Can Leverage Affiliate Marketing to Grow Your Sales and Small Business 00:04:00 Top Companies to Find Affiliate Marketing Products 00:04:00 Ways to Pick Out the Best Products to Be an Affiliate For 00:03:00 Affiliate Marketing Strategies 00:04:00 Ways to Optimize Your Product Pages for Conversions 00:04:00 Module 02: Affiliate Marketing Strategies Choose the Right Affiliates 00:04:00 Attract Sales with Coupons, Deals, And Promotions 00:04:00 Build A Robust Affiliate Network 00:04:00 Leverage Affiliate Promotions from Multiple Sources 00:04:00 Leverage the Power of Niche Influencers 00:04:00 Module 03: Reasons to Consider Affiliate Marketing Make Money Selling the Products That Made A Difference for You 00:04:00 Supplement Your Current Income 00:06:00 It's A Passive Income 00:04:00 Amazing Potential for Big Returns 00:06:00 Module 04: Top Companies to Affiliate Marketing Products Amazon 00:04:00 eBay Partner Network 00:04:00 Rakuten 00:05:00 Share A Sale 00:04:00 Click Bank 00:03:00 Module 05: Ways to Leverage Affiliate Marketing Utilise User-Generated Content to Expand Reach 00:05:00 Leverage Affiliate Marketing as Instant Social Proof 00:04:00 Reward Your Top Affiliates 00:05:00 Boost Affiliate Percentages on Less Popular Goods 00:03:00 Module 06: Ways To Optimize Your Product Pages Have a Strategy and a Goal Before You Start Building A Page 00:04:00 Keep It Clean 00:04:00 A/B Test Everything 00:04:00 Optimise For Mobile 00:05:00 Add Social Proof 00:04:00 Module 07: Ways To Pick Out The Best Products Make A-List 00:04:00 Look For Market Niche For The Products 00:04:00 Market's Needs 00:04:00 Leaks 00:04:00 Customer's Reasons 00:04:00 Assignment Assignment - Affiliate Marketing Extended Diploma 00:00:00 Affiliate Marketing Extended Diploma (Old Version) Advanced Diploma in Affiliate Marketing Introduction 00:30:00 Section I - What Is An Affiliate Marketing? Basics of Affiliate Marketing 00:30:00 Affiliate Marketing 101 - The Basics 00:30:00 Researching Your Products 01:00:00 Section II - Newbie to Profitable Affiliate Build Up To About 10 Products To Promote 01:00:00 Getting Traffic To Your Site 01:00:00 Section III: Step-by-Step Checklist To Affiliate Success Step-by-Step Checklist To Affiliate Success 01:00:00 Sign Up For Web 2.0 Social Networking 00:30:00 Consider Setting Up Your Own Website 01:00:00 Mock Exam Mock Exam- Affiliate Marketing Extended Diploma 00:20:00 Final Exam Final Exam- Affiliate Marketing Extended Diploma 00:20:00

Affiliate Marketing Extended Diploma
Delivered Online On Demand10 hours 9 minutes
£25

Jobstacle Course: Overcoming the Obstacles to Landing Your Next Job

5.0(2)

By Canary Careers

"Discover the path to your dream job with our transformative online course, 'Overcoming the Obstacles to Landing Your Next Job.' Led by a top-rated resume writer and member of the British CV Writers Association, this step-by-step guide provides proven methods, data-driven insights, and an ATS optimized resume template. Join us today and conquer the job market with confidence and success!"

Jobstacle Course: Overcoming the Obstacles to Landing Your Next Job
Delivered Online On Demand1 hour
£18.99

Python Machine Learning Crash Course for Beginners

By Packt

The goal of this course is to use Python machine learning to create algorithms that you can use in the real world. You'll start with the basics of machine learning. You'll learn how to create, train, and optimize models and use these models in real-world applications.

Python Machine Learning Crash Course for Beginners
Delivered Online On Demand9 hours 27 minutes
£134.99

The Accreditation Gateway

By Vocal Process Ltd.

For serious singing professionals, teachers and coachesTake your communication and diagnosis skills to the next level Real life singing lessons for you to watch and analyseTeaching across music genres - lessons in classical, Musical Theatre and CCMTeaching across ages - from teen twins to retiredWatch Gillyanne and Jeremy coach the students in online masterclasses What you will discover Unit 1 - The focus mindmap. What you should be listening and watching for the first time you meet a student. Plus two masterclasses with male voice on a classic musical theatre song and a contemporary Indie pop song Unit 2 - The braindump Sorting your thoughts out when working with singers. Plus watching a "group" lesson with female twins, covering vocal warmups and classical repertoire (Purcell). Unit 3 - Coaching an avocational singer Working with a retired singer on classical and light classical repertoire (Quilter and Vivaldi). Legato line, diction and phrasing Units 4 and 5 are live with Gillyanne and Jeremy - dates will be arranged after purchase to suit the group Finding the key focus for each student in each lesson Discovering how the Brain Dump method can revolutionise your diagnostic skills, whether live in person or teaching online Using the Brain Dump method and filtering to create new exercises based on your student's needs that day Developing a robust process for teaching one student regularly, from first Brain Dump to future lesson planning, plus tracking progress and creating solutions Who we are We are Dr Gillyanne Kayes (singing voice specialist) and Jeremy Fisher (vocal & performance coach). We're both avid tea drinkers (Gillyanne loves builder's tea and first flush Darjeeling, Jeremy's a black-tea-no-sugar Ceylon drinker, but his favourite tea-du-jour is Royal Blend from Fortnum and Mason in London. We've co-taught for more than 25 years all over the world. We've written 10 books on vocal technique, including five Amazon #1 bestsellers. We've been creating vocal training resources since 2004, including courses, DVDs, CDs, ebooks, the Build Your Own Larynx template and most recently the amazing online Learning Lounge with over 600 voice training resources. We love helping people find and share their truth as teachers and performers. Cheers!

The Accreditation Gateway
Delivered Online On Demand
£418.80

Live UI Expert Session

5.0(5)

By UX Academy

About UX Academy: UX Academy provides live online hands-on training to help you take the next step in your career no matter what level you’re at. Offering Beginner, Intermediate UX courses, Product Design, Strategy and Voice Design developed in collaboration with Amazon.

Live UI Expert Session
Delivered OnlineFlexible Dates
FREE