• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1245 Brow courses

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25

Autodesk Revit Complete Training

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime: With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This Autodesk Revit Complete Training course will help you to navigate the interface, enabling you to download, install, and understand essential tools such as Align, offset, mirror and many more. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Understand how to download, install, and troubleshoot Autodesk Revit Learn how to navigate the interface Get introduced to walls and wall panel, wall option bar, and wall properties palette Understand essential tools such as Align, offset, mirror - Pick, Axis, Mirror - Draw Axis Learn how to define the building levels and create reference levels 2 Understand how to make the Grid system Know major components of Autodesk Revit, such as placing structural or architectural columns on the grid Learn how to place the external and internal walls Understand minor components of Autodesk Revit, such as setting doors from the type selector Understand what is vertical circulation and roof components Why Autodesk Revit Complete Training right for you? This comprehensive online course will help you develop a solid understanding of certified hardware, subscriptions, Revit VS Revit LT, and help you install Revit on an Apple MAC. You will learn how to get started with Autodesk Revit, create an account, install the software, and configure the library and template file paths. In addition, this extensive course will teach you how to use the interface such as start screen, file tab, quick access toolbar and info centre, and navigate properties palette and project browser. By the end of the course, you will gain theoretical knowledge in Autodesk Revit essential tools, major and minor components, steps to create the next level, and vertical circulation. Autodesk Revit Complete Training Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Download, Install and Troubleshooting Introduction to download and install Revit System Requirements Certified Hardware Subscriptions Revit VS Revit LT Installing Revit on an Apple MAC Getting Started Creating an Account Installing the Software Configuring the Library and Template File Paths Introduction to the Beginners Course Introduction to the Beginners Course Touring the Interface 1.1 Start Screen [NOTES ATTACHED] 1.2 File Tab, Quick Access Toolbar & Info Centre 1.3 Tabs, Ribbons & Panels 1.4 Properties Palette & Project Browser 1.5 Status Bar, View Controls, Selection Toggles & Context Menu 1.6 Navigating the Drawing Area 1.7 Contextual Tab 1.8 Terminology Introduction to Walls 2.1 Introduction to Walls & the Wall Panel 2.2 Wall Option Bar 2.3 Wall Properties Palette Basic Tools 3.1 Align, Offset, Mirror - Pick Axis, Mirror - Draw Axis 3.2 Move, Copy, Rotate, Trim/extend to Corner, T/E Single Element, T/E Multiple 3.3 Split element, Pin, Array, Scale, Delete Datum Elements 4.1 Defining the Buildings Levels & Creating Reference Levels 4.2 Creating the Grid System Major Components 5.1 Placing Structural Columns on the Grid 5.2 Placing Architectural Columns on the Grid 5.3 Placing the External Walls 5.4 Placing the Internal Wall 5.5 Using the Equality Constraints 5.6 Placing the Ground Floor Slab 5.7 Placing a Boundary Footpath Minor Components 6.1 Placing Doors From the Type Selector 6.2 Loading Doors From the Library 6.3 Creating a New Door Type 6.4 Adding a Wall Opening 6.5 Editing the Walls Profile to Create an Opening 6.6 Adding a Structural Opening to the Wall 6.7 Placing Windows Creating the Next Level 7.1 Increasing Top Constraint 7.2 Placing the First Floor Slab 7.3 Adding a Shaft Opening to the Slab 7.4 Selection Filter and Aligned to Selected Levels Vertical Circulation 8.1 Stair by Component 8.2 Stair by Sketch 8.3 Creating Project Stair 8.4 Placing a Railing 8.5 Creating a Railing Roof Component 9.1 Introduction to Roof by Footprint 9.2 Pitched Roof by Footprint 9.3 Flat roof by Footprint 9.4 Roof by Extrusion Curtain Walls 10.1 Introduction to Curtain Walls 10.2 Constructing a Curtain Wall 10.3 Create 'Curtain Wall - Entrance' 10.4 Create 'Curtain Wall - Rear' 10.5 Create 'Curtain Wall - Front' Reflected Ceiling Plan 11.1 Introduction to Reflected Ceilings 11.2 Adjusting the Ceiling Position 11.3 Creating the First Floor Ceiling Plan 11.4 Adding Components to the Ceiling 11.5 Example of Rendered Ceiling Components Creating a 2D Detail (Callout) 12.1 Setting up a Callout 12.2 Masking and Filled Regions 12.3 Detail Components and Repeating Detail Components 12.4 Placing Insulation 12.5 Using the Detail Line and Creating a Line Style 12.6 Adding Text with Leaders 12.7 Adding Break Lines Dimensions 13.1 Introduction to Dimensions by Individual References 13.2 Dimension by Entire Wall 13.3 Witness Lines 13.4 Modifying a Dimension 13.4 Modifying a Dimension 14.1 Introduction to Tags 14.2 Adding information to the Tags 14.3 Placing Window Tags 14.4 Placing Wall Tags 14.5 Applying Tags to First Floor 14.6 Creating a Room and Placing Room Tags 14.7 Creating a Room Legend 14.8 Creating a Room Schedule 14.9 Creating a Door Schedule 14.10 Creating a Window Schedule 14.11 Creating a Door & Window Legend Visualisations 15.1 Introduction to Shadows and Sun Settings 15.2 Creating a One-Day Solar Study 15.3 Introduction to Rendering and Rendering First Image 15.4 Rendering Second Image 15.5 Introduction to Walkthroughs 15.6 Modifying a Walkthrough 15.7 Creating a Walkthrough Over Two Levels Create Sheets & Print 16.1 Opening a Sheet and Overview of the Title-block 16.2 Setting Up a Sheet Part 1 16.3 Setting Up a Sheet Part 2 16.5 Loading an A2 Title-block 16.6 Duplicating Views 16.7 Page Setup & Printing Who should take this course? This comprehensive course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of Autodesk Revit. Entry Requirements There are no academic entry requirements for this course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Autodesk Revit Complete Training Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Autodesk Revit Complete Training
Delivered Online On Demand
£25

CompTIA A+ 900 Certification - Complete Video Course

4.3(43)

By John Academy

Description: The series CompTIA A+ 900 Certification - Complete Video Course provides an extensive lesson about CompTIA A+ 900 Certification. A+ Certification is one of the leading certificates in the computer industry. It certifies the competency of PC Service Specialists. Sponsored by CompTIA - the Computing Technology Industry Association, and tests, the course is administered by Pearson VUE. The course includes more than 50 lessons related to the Computer industry. The course starts by describing firmware and BIOS configuration options. After that, the course will teach you about the motherboard basics including motherboard sizes, form factors, and AMD CPU socket types. The course also includes topics such as Expansion slots, RAM types and features, install and configure PC expansion cards, install and configure storage device, CPU's and cooling methods and PC connection interfaces. The course will also focus on power supplies, PC connectors, printing technologies, networking tools, etc. In short, the course provides all the necessary information about computer hardware and operating system. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA A+ 900 Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Configuring BIOS Firmware FREE 00:07:00 BIOS Configuration Options 00:25:00 Motherboards Motherboard Sizes Form Factors 00:14:00 The Motherboard 00:12:00 AMD CPU Socket Types 00:11:00 Expansion Slots Expansion Cards 00:13:00 Bus Speeds 00:28:00 RAM Types and Features Memory 00:06:00 Types of RAM 00:07:00 Install and Configure PC Expansion Cards Ports 00:11:00 SCSI Connections 00:14:00 Audio Video Connections 00:26:00 Install and Configure Storage Devices Storage Devices 00:17:00 Hard Drives 00:17:00 Media Capacity 00:21:00 CPU's and Cooling Methods CPU Types and Characteristics 00:14:00 PC Connection Interfaces Physical Connections USB 00:11:00 Physical Connections VGA 00:11:00 Wireless Connections Bluetooth 00:06:00 Power Supplies Power Supply Specifications 00:16:00 Custom Computer Specifications What is a Standard Client 00:13:00 Audio Video Editing Workstations 00:08:00 Installing Displays Display Device Types 00:20:00 Backlighting 00:12:00 PC Connectors DVI to HDMI 00:13:00 Installing Peripheral Standard Input Device Types 00:16:00 Expansion Card Types 00:11:00 Multimedia Devices 00:11:00 Installing Multifunction Devices and SOHO Networks SOHO Networks 00:17:00 WPS 00:16:00 Encryption 00:14:00 Printer Technologies Printers 00:02:00 Printer Technologies Topic B Inkjet Printers 00:13:00 Printer Maintenance Technical Printer Components 00:09:00 Local and Network-Based Printers 00:22:00 Networking Network Interface Card Characteristics 00:20:00 Fiber Optic Cables 00:14:00 Properties and Characteristics of TCP/IP TCP IP 00:14:00 IP Address Classes 00:14:00 Addressing Schemes 00:17:00 TCP vs. UDP Ports 00:09:00 LDAP 00:04:00 Wi-Fi Networking Standards and Encryption Types Standards 00:03:00 Install and Configure SOHO Wireless/Wired Router Setting up your Router 00:10:00 Define Appropriate NAT Policies 00:16:00 Architecture and Internet Connection Types LANs 00:08:00 Network Topologies 00:11:00 ISPs 00:06:00 Networking Tools Cable Testers 00:13:00 Laptop Hardware Components Laptops 00:09:00 Laptop Expansion Options 00:10:00 Auto-Switching and Fixed Input Power Supplies 00:09:00 Mobile Devices What is Mobile Technology 00:09:00 Mobile Device Features 00:09:00 Bluetooth Configuration Method 00:08:00 Mobile Device Ports and Accessories Mobile Device Connection Types 00:10:00 Troubleshooting Mobile Devices 00:11:00 Troubleshooting Theory Troubleshooting Theory 00:16:00 Boot to Incorrect Device 00:16:00 PC Indicator Lights 00:10:00 Repair vs. Replace 00:10:00 Troubleshooting RAID Arrays and Hard Drives Drive and Array Troubleshooting Tools 00:06:00 Common RAID Array Issues 00:17:00 Troubleshooting Video Common Video and Display Issues 00:01:00 Troubleshooting Network Issues Common Network Issues 00:12:00 Troubleshooting Printers Common Printer Troubleshooting Tools 00:14:00 Windows Operating Systems Microsoft Windows 00:12:00 Microsoft Windows Features 00:17:00 Other Operating Systems 00:15:00 Installation Types 00:14:00 Customizing System Options 00:19:00 Command Line Tools The Command Prompt 00:12:00 Microsoft Operating System Features and Tools Administrative Tools 00:41:00 Task Manager 00:28:00 Memory Diagnostic Tool 00:46:00 Control Panel Utilities The Control Panel 00:11:00 Internet Options 00:10:00 Types of User Accounts 00:11:00 Computer My Computer 00:13:00 Permissions 00:31:00 System 00:10:00 Windows Networking on Client Desktops Workgroups 00:20:00 Network Connection Types 00:18:00 Preventative Maintenance Data Backup and Restoration 00:11:00 Scheduling Tasks 00:26:00 Features and Functionality of the Mac OS and Linux Operating Systems Patch Management in Mac OS X and Linux 00:09:00 Screen Sharing 00:06:00 Mac OS Multitouch Gestures - Touchscreen 00:09:00 Client Side Virtualization What is Virtualization 00:08:00 Virtual Desktop Infrastructure 00:12:00 Cloud-based Concepts SaaS (Software as Service) 00:09:00 Network Host Properties Server Roles 00:12:00 Mobile Operating Systems Open Source Software 00:03:00 Mobile Device Network and E-mail Mobile Device Hotspot 00:10:00 Security Malware 00:09:00 Social Engineering 00:13:00 Prevention Methods Physical Security 00:14:00 Hard Drive Sanitation 00:14:00 User Education 00:26:00 Windows Security Settings Users and Groups 00:11:00 Security Best Practices Password Best Practices 00:04:00 Securing Mobile Devices Locks 00:07:00 Troubleshooting Common PC Tools Operating System Troubleshooting Tools 00:12:00 Application Errors 00:16:00 Common Network Issues 00:12:00 Common Security Issues 00:10:00 Common PC Security Issues Browser Issues 00:06:00 Common Mobile Operating Systems Troubleshooting Dim Display 00:09:00 No Sound from Speakers 00:07:00 Common Safety Practices Static Electricity 00:14:00 Electrical Hazards 00:12:00 General Power Issues 00:10:00 Hazardous Material Disposal Procedures 00:07:00 Maintenance Tools and Techniques Professional Conduct 00:11:00 Types of Hardware Toolkits 00:11:00 Hard Drive Self-Tests 00:05:00 Computer Component Maintenance Techniques 00:10:00 Privacy and Licensing Concepts Incident Response 00:08:00 Proper Communication and Professionalism 00:07:00 Set Expectations 00:06:00 Mock Exam Mock Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA A+ 900 Certification - Complete Video Course
Delivered Online On Demand26 hours
£24

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

Adobe Premiere Pro CC Diploma

By Course Cloud

Master the techniques and tricks of Adobe Premiere Pro CC with the professional Diploma in Adobe Premiere Pro CC course. This course is a real career boost. Adobe Premiere Pro is the best choice for you to edit videos. It allows you to make visually stunning videos. This course teaches you how to use the software professionally. You can create professional productions for film, TV, and web. You will learn how to use a media browser for importing clips, how to start a new sequence, utilise editing tools and other essential techniques. CPD accredited this course, so you will get a career boost upon completing this course. Our Adobe Premiere Pro CC Diploma is packed with 73 modules and taking 6 hours, 35 minutes to study. You will be awarded a certificate of completion, the proof of your expertise in this field. If you are an aspiring creative professional or looking for professional skills to excel in this field, a certificate from this course will help you appear as a strong candidate. You can also validate your certification from our website. It doesn't matter if you are willing to study full-time or part-time. This course is designed for any student, and you can even complete it at your own pace. The materials are accessible from anywhere, using any device, at anytime. Besides that, our experienced tutors will help you throughout the comprehensive syllabus of this course and answer all your queries through email.

Adobe Premiere Pro CC Diploma
Delivered Online On Demand
£25

Freelancing for Designers and Developers

By Course Cloud

Learn how to become a freelance designer and developer today by taking this course. You will learn how to create a CV to land you the jobs of your dreams. You will learn how to avoid common freelancing career mistakes, how to charge for your work and more. This Freelancing for Designers and Developers course will take you through the essentials steps to succeed. You will learn how to create a portfolio that sets you apart from the crowd. Upon completion, you will know how to browse freelancing jobs, put yourself forward for them and successfully gain clients. Freelancing for Designers and Developers is a best selling course developed by industry experts and already helped tons of students like you. It is suitable for anyone who wants to improve their knowledge and skills in the or relevant sector.  This course is accredited by CPD, so you will get a career boost upon completing this course. Our Freelancing for Designers and Developers is packed with 41 modules and 4 hours, 47 minutes of study. You will be awarded with a certificate of completion, the proof of your expertise in this field. If you want to get a job or looking for professional skills to excel in this field, a certificate from this course will help you appear as a strong candidate. You can also validate your certification from our website. It doesn't matter if you are willing to study full-time or part-time. This course is designed for any type of student and you can even complete it at your own pace. The materials are accessible from anyplace, any device and anytime.  Besides that, our experienced tutors will help you throughout the comprehensive syllabus of this course and answer all your queries through email.

Freelancing for Designers and Developers
Delivered Online On Demand
£25

Penetration Testing with OWASP ZAP

By Course Cloud

The OWASP Zed Attack Proxy is an open source means of testing web applications manually. It is one of the leading tools for identifying web application vulnerabilities. The Penetration Testing with OWASP ZAP course will take you through the basic functions of ZAP, equipping you with a range of ethical hacking skills needed to become a successful Web Developer or Penetration Tester. It will take you through the very basics, from how to install ZAP, to the steps for configuring your browser to use AP as a proxy.  By the end of this course, you will be able to use ZAP to assess web applications and conduct penetration testing to identify vulebrailities and uncover hidden bugs. You will also be able to identify opportunities to strengthen your company's and create reports of your results. This best selling Penetration Testing with OWASP ZAP has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Penetration Testing with OWASP ZAP is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Penetration Testing with OWASP ZAP is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Penetration Testing with OWASP ZAP is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Penetration Testing with OWASP ZAP, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Penetration Testing with OWASP ZAP will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Penetration Testing with OWASP ZAP to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Penetration Testing with OWASP ZAP
Delivered Online On Demand
£25

HTML5 & CSS3 - Project Based Learning

By Course Cloud

Course Overview Build your own professional website from scratch using HTML5 and CSS3. Designed by industry experts, this complete course will take you through the entire process of creating a complete functioning website step-by-step. It will teach you everything you need to know to build a professional website - from practices for ensuring smooth functionality and navigability, to up-to-date techniques for content integration.  Through the guidance of an experienced instructor, you will learn how to use a web browser and text editor like a pro, in just a short space of time. This introductory training course is for anyone looking to build professional, functional websites of any kind, step-by-step. This best selling HTML5 & CSS3 - Project Based Learning has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth HTML5 & CSS3 - Project Based Learning is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The HTML5 & CSS3 - Project Based Learning is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The HTML5 & CSS3 - Project Based Learning is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the HTML5 & CSS3 - Project Based Learning, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the HTML5 & CSS3 - Project Based Learning will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the HTML5 & CSS3 - Project Based Learning to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

HTML5 & CSS3 - Project Based Learning
Delivered Online On Demand
£25

Three.js & WebGL 3D Programming Course for Beginners

By Course Cloud

Course Overview Fast track your career as a Web Developer or designer, and master Three.js for creating animated computer graphics, and more. The Three.js & WebGL 3D Programming Course for Beginners will introduce you to the fundamental tools of Three.js for creating basic 3D web graphics, applications and games for web browsers. Taught by an expert instructor, you will learn how to perform a wide range of tasks, from model loading and rendering graphic information in 3D, to adding controls, and working with different lighting. This introductory training course will equip you with the professional skills to build different worlds and scenes, to help you put together an impressive portfolio to kickstart your career. This best selling Three.js & WebGL 3D Programming Course for Beginners has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Three.js & WebGL 3D Programming Course for Beginners is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Three.js & WebGL 3D Programming Course for Beginners is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Three.js & WebGL 3D Programming Course for Beginners is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Three.js & WebGL 3D Programming Course for Beginners, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Three.js & WebGL 3D Programming Course for Beginners will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Three.js & WebGL 3D Programming Course for Beginners to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Three.js & WebGL 3D Programming Course for Beginners
Delivered Online On Demand
£25

70-697 - Configuring Windows Devices

4.3(43)

By John Academy

Description: The 70-697 - Configuring Windows Devices course teaches you how to configure Windows devices. Throughout the course, you will learn about the new features of Windows 10 and how to deploy it. You will be introduced to the basic introduction to Client Hyper-V, and learn about creating virtual machines and managing virtual machine storage and snapshots. The course will teach you the system of configuring device settings by configuration tools, common configuration options, managing user accounts, using control panel, using Windows administrative tools, and using Windows PowerShell. You will learn how to connect Windows 10 to networks, how to share data and printers, and how to manage apps. You will also learn about the techniques of securing Windows 10 devices, monitoring and maintaining Windows 10, managing users in the enterprise, managing desktops and applications in the enterprise, and managing devices in the enterprise. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-697 - Configuring Windows Devices is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-697 - Configuring Windows Devices is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. What's New in Windows 10 What Makes Windows 10 Different? FREE 00:14:00 Primary Feature Overview 00:14:00 Navigating and Using Windows 10 00:34:00 Windows 10 Deployment Standard Windows 10 Deployment 01:11:00 Enterprise Deployment Strategies 00:52:00 Deploying Virtual Windows 10 Desktops Introduction to Client Hyper-V 00:12:00 Creating Virtual Machines 00:15:00 Managing Virtual Machine Storage and Snapshots 00:09:00 Configuring Device Settings Overview of Configuration Tools 00:14:00 Common Configuration Options 00:17:00 Managing User Accounts 00:20:00 Using Control Panel 00:10:00 Using Windows Administrative Tools 00:28:00 Using Windows PowerShell 00:41:00 Connecting Windows 10 to Networks TCPIP Network Connectivity 00:40:00 Name Resolution 00:10:00 Wireless Connectivity 00:21:00 Remote Access Overview 00:18:00 Troubleshooting Connectivity 00:20:00 Sharing Data and Printers Managing Hard Disks 00:37:00 Managing Storage Spaces 00:06:00 Overview of Data Access 00:09:00 Configuring and Managing File Access 00:24:00 Managing Shared Folders 00:12:00 Understanding Work Folders 00:05:00 Managing Printers 00:12:00 Managing Apps Installing and Configuring Applications 00:08:00 Managing Apps From the Windows Store 00:05:00 Managing Web Browsers 00:19:00 Securing Windows 10 Devices Security Overview 00:11:00 Configuring Local Security 00:20:00 Securing Network Communications 00:31:00 Configuring Data Security 00:25:00 Monitoring and Maintaining Windows 10 Working with Updates 00:08:00 Monitoring and Optimizing 00:35:00 Managing Devices and Drivers 00:14:00 Recovering Files and Devices 00:19:00 Managing Users in the Enterprise Managing User Profiles 00:20:00 User State Virtualization 00:09:00 User Profile Migration 00:11:00 Managing Desktops and Applications in the Enterprise Using Group Policy to Manage Windows 10 Devices 00:44:00 Using Group Policy to Manage Applications 00:18:00 Managing Devices in the Enterprise The Enterprise Mobility Suite 00:27:00 Managing Desktops and Mobile Clients 00:07:00 Managing Updates and Endpoint Protection 00:04:00 Managing Applications 00:03:00 Mock Exam Mock Exam- 70-697 - Configuring Windows Devices 00:20:00 Final Exam Final Exam- 70-697 - Configuring Windows Devices 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-697 - Configuring Windows Devices
Delivered Online On Demand15 hours 43 minutes
£23