Overview Learn AutoCAD Programming using VB.NET - Hands On! Course is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Learn AutoCAD Programming using VB.NET - Hands On! Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Unit 01: Introduction Module 01: Course Outline 00:05:00 Module 02: Introduction 00:01:00 Module 03: Who is this Course for? 00:01:00 Module 04: What will I learn from this Course? 00:01:00 Module 05: What is VB.NET? 00:01:00 Module 06: What is AutoCAD .NET API? 00:01:00 Module 07: What are the advantages of programming in AutoCAD .NET API? 00:01:00 Module 08: Hands-on Projects overview 00:06:00 Unit 02: Exploring AutoCAD .NET API Components Module 01: AutoCAD .NET API Components Overview 00:01:00 Module 02: AutoCAD .NET API Assemblies 00:02:00 Module 03: Understanding AutoCAD Object Hierarchy 00:03:00 Module 04: AutoCAD .NET API Application Object 00:02:00 Module 05: AutoCAD .NET API Document Object 00:02:00 Module 06: AutoCAD .NET API Database Object 00:04:00 Unit 03: Hello AutoCAD from VB.NET Module 01: Section Overview 00:04:00 Module 02: Installing Visual Studio 2019 00:05:00 Module 03: Setting up Visual Studio 2019 Integrated Development Environment (IDE) 00:04:00 Module 04: Creating First VB.NET Plugin (Hello AutoCAD) 00:12:00 Module 05: Different ways to communicate with the User 00:04:00 Module 06: Configuring VS2019 Target Processor 00:10:00 Unit 04: Creating AutoCAD Objects using VB.NET Module 01: Creating AutoCAD Object using VB.NET Overview 00:01:00 Module 02: Creating DrawObjects Project 00:04:00 Module 03: Creating a Line Object using VB.NET 00:15:00 Module 04: Creating a MText Object using VB.NET 00:12:00 Module 05: Creating a Circle Object using VB.NET 00:09:00 Module 07: Creating a Polyline Object using VB.NET 00:08:00 Module 08: Creating Multiple Circles Vertically 00:09:00 Module 09: Creating Multiple Circles Horizontally 00:05:00 Unit 05: Manipulating AutoCAD Objects using VB.NET Module 01: Manipulating AutoCAD Objects Overview 00:01:00 Module 02: Creating the Project ManipulateObjects 00:04:00 Module 03: Creating the SingleCopy Method 00:13:00 Module 04: Creating the MultipleCopy Method 00:11:00 Module 05: Creating the EraseObject Method 00:12:00 Module 06: Creating the MoveObject method 00:07:00 Module 07: Creating the MirrorObject method 00:10:00 Module 08: Creating the RotateObject method 00:07:00 Module 09: Creating the ScaleObject method 00:05:00 Module 10: Creating the OffsetObject method 00:05:00 Unit 06: Exploring AutoCAD Dictionaries using VB.NET Module 01: Exploring AutoCAD Dictionaries - Overview 00:02:00 Module 02: Creating LayersLineTypesAndStyles Project 00:06:00 Module 03: Creating the ListLayers Method 00:11:00 Module 04: Creating the CreateLayer Method 00:10:00 Module 05: Creating the UpdateLayer Method 00:12:00 Module 06: Creating the SetLayerOnOff Method 00:08:00 Module 07: Creating the SetLayerFrozenOrThaw Method 00:04:00 Module 08: Creating the DeleteLayer Method 00:05:00 Module 09: Creating the LockUnlockLayer Method 00:04:00 Module 10: Creating the SetLayerToObject Method 00:08:00 Module 11: Creating the ListLineTypes Method 00:09:00 Module 12: Creating the LoadLineType Method 00:07:00 Module 13: Creating the SetCurrentLineType Method 00:05:00 Module 14: Creating the DeleteLineType Method 00:09:00 Module 15: Creating the SetLineTypeToObject Method 00:05:00 Module 16: Exploring TextStyles - Overview 00:01:00 Module 17: Creating the ListStyles Method 00:08:00 Module 18: Creating the UpdateCurrentTextStyleFont Method 00:12:00 Module 19: Creating the SetCurrentTextStyle Method 00:08:00 Module 20: Creating the SetTextStyleToObject Method 00:08:00 Unit 07: User Interactions in VB.NET Module 01: User Input Functions - Overview 00:02:00 Module 02: Creating the UserInteractions Project 00:03:00 Module 03: Creating the GetName Method 00:11:00 Module 04: Creating the SetLayer Method using the GetString function 00:12:00 Module 05: Creating the CreateLineUsingGetpoint Method 00:11:00 Module 06: Creating the CalculateDefinedArea Method 00:17:00 Module 07: Creating the DrawObjectsUsingGetKeywords Method 00:14:00 Module 08: Creating the GetDistanceBetweenTwoPoints Method 00:05:00 Module 09: Creating the CountObjects Method 00:15:00 Unit 08: Selection Sets and Filters Module 01: Selection Sets and Filters - Overview 00:13:00 Module 02: Creating the SelectionSets Project 00:05:00 Module 03: Creating the SelectAllAndChangeLayer Method 00:12:00 Module 04: Creating the SelectObjectOnScreen Method 00:08:00 Module 05: Creating the SelectWindowAndChangeColor Method 00:06:00 Module 06: Creating the SelectCrossingAndDelete Method 00:05:00 Module 07: Creating the SelectFenceAndChangeLayer Method 00:06:00 Module 08: Creating the CountPickFirstSelection Method 00:07:00 Module 09: Creating the SelectLines Method 00:13:00 Module 10: Creating the SelectMTexts Method 00:05:00 Module 11: Creating the SelectPlines Method 00:04:00 Module 12: Creating the SelectWalls Method 00:07:00 Module 13: Creating the SelectStairs Method 00:03:00 Module 14: Creating the SelectFrenchDoors Method 00:04:00 Module 15: Creating the SelectBifoldDoors Method 00:03:00 Module 16: Creating CountReceptacles Method 00:04:00 Module 17: Creating the CountLightingFixtures Method 00:10:00 Unit 09: Developing Projects - Hands On Module 01: Developing Projects - Hands on Overview 00:02:00 Module 02: BlocksCounter Plugin Demo 00:03:00 Module 03: Creating the BlocksCounter Project 00:04:00 Module 04: Creating the CountBlocksToTable Method 00:08:00 Module 05: Creating the PromptUser Function 00:08:00 Module 06: Creating the GatherBlocksAndDrawTable Method 00:12:00 Module 07: Continuation of GatherBlocksAndDrawTable Method 00:17:00 Module 08: Running and Debugging the BlocksCounter Project - Part 1 00:15:00 Module 09: Running and Debugging the BlocksCounter Project - Part 2 00:11:00 Module 10: Running and Debugging the BlocksCounter Project - Part 3 00:01:00 Module 11: Creating the ObjectExtractor Plugin Project 00:04:00 Module 12: Creating the ExtractObjects Method 00:07:00 Module 13: Creating the ExtractLine Method 00:16:00 Module 14: Running and Debugging the ExtractLine Method 00:05:00 Module 15: Creating the ExtractCircle Method 00:11:00 Module 16: Creating the ExtractMText Method 00:13:00 Module 17: Creating the ExtractPolyline Method 00:19:00 Module 18: Creating the ExtractBlock Method 00:10:00 Unit 10: Conclusion Module 01: Congratulations and Thank you very much! 00:01:00 Assignment Assignment - Learn AutoCAD Programming using VB.NET - Hands On! 00:00:00
Bring data to life with the D3.js data visualization library, and get up to speed with JavaScript, HTML, and CSS to build stunning data visuals
Learn to effectively monitor the performance, health, and availability of Azure Services and your cloud resources
In this course, you will learn how to unlock the power of Generative AI and learn to generate passive income for profitable online ventures with ChatGPT. Gain the skills to automate tasks efficiently, generate revenue from your content, and uphold ethical AI practices. This course is perfect for beginners or anyone seeking to enhance their online ventures with AI technology.
Description: This Certified Vulnerability Assessor (CVA) - Complete Video Training covers everything you need to know about becoming a Certified Vulnerability Assessor. In this course you will learn about vulnerability types, assessing the network, assessing web servers & applications, assessing remote & VPN services, vulnerability assessment tools of the trade, and output analysis. The course will help you to understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The CVA course provides foundational knowledge of general VA tools as well as popular exploits an IT engineer should be familiar with. The Certified Vulnerability Assessor (CVA) - Complete Video Training is a fundamental cybersecurity certification course that focuses on vulnerability assessments. It focuses on foundational information such as the importance of a Vulnerability Assessment and how it can help an engineer prevent serious break-ins to your organization. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Vulnerability Assessor (CVA) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Vulnerability Assessor (CVA) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Why Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types Vulnerability Types 00:23:00 Assessing the Network Assessing the Network 00:40:00 Assessing Web Servers & Applications Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis Output Analysis 00:12:00 Mock Exam Mock Exam- Certified Vulnerability Assessor (CVA) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Vulnerability Assessor (CVA) - Complete Video Training 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
The comprehensive Vestacp Installation and Configuration Training has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Vestacp Installation and Configuration Training today, and learn from the very best the industry has to offer! This best selling Vestacp Installation and Configuration Training has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Vestacp Installation and Configuration Training is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Vestacp Installation and Configuration Training is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Vestacp Installation and Configuration Training is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Vestacp Installation and Configuration Training, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Vestacp Installation and Configuration Training will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Vestacp Installation and Configuration Training to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
The comprehensive cPanel Installation and Configuration Training has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the cPanel Installation and Configuration Training today, and learn from the very best the industry has to offer! This best selling cPanel Installation and Configuration Training has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth cPanel Installation and Configuration Training is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The cPanel Installation and Configuration Training is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The cPanel Installation and Configuration Training is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the cPanel Installation and Configuration Training, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the cPanel Installation and Configuration Training will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the cPanel Installation and Configuration Training to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Learn Database Driven Web Development With Django and Python!
Overview Boost your career opportunities within the IT industry and learn new abilities with the latest technology and software. Today's businesses rely on IT systems to support them, so this course will quickly upgrade your skills and allow you to apply for the latest roles. The Essential IT Skills Level 3 course provides you with all the knowledge needed to master every primary IT process. You will be explicitly taught how to produce professional spreadsheets and presentations with the standard Microsoft software. All this will be accompanied by varied tips and recommendations on approaching IT assignments and how to make the best impressions at work. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this Essential IT Skills Level 3. It is available to all students, of all academic backgrounds. Requirements Our Essential IT Skills Level 3 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 2 sections • 12 lectures • 04:00:00 total length •Module 01: Introduction: A Transforming Technology: 00:30:00 •Module 02: Importance of Information Technology: 00:10:00 •Module 03: Communication and Network: 00:30:00 •Module 04: Future Skills Required in Information Technology: 00:15:00 •Module 05: Technology as a Foundation Skill Area: 00:10:00 •Module 06: Word Processing Software: 00:30:00 •Module 07: Presentation Software: 00:30:00 •Module 08: Creating and Editing Spreadsheet (Part 1: The Basics of Spreadsheets): 00:15:00 •Module 09: Creating and Editing Spreadsheet (Part 2: Navigation and Edit): 00:25:00 •Module 10: Storing Database: 00:25:00 •Module 11: Information Technology Project Management: 00:20:00 •Assignment - Essential IT Skills Level 3: 00:00:00
Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00