• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5935 Computing & IT courses

The Complete Android & Java Bootcamp - Material Design UI/UX

By iStudy UK

Description  If you're keen on becoming a Pro Programmer when learning Android development and build stunning Android Apps using the best UI/UX Design principles, then The Complete Android & Java Bootcamp - Material Design UI/UX will be the right choice for you. Through multiple engaging lessons, you'll learn Java and Android Development for building material Design Apps, learn UI/UX and gain knowledge of Java and Android Development to create and design high-quality and scalable Android Material Design Apps. Moreover, learn how to install the tools and implement techniques to run Java programs like IntelliJ and install the Java libraries onto your machines such as Windows, Linux and Mac. What you'll learn Build robust UI/UX Material Design Apps Learn Java and Android Development Build Android Apps Using Android Fragments Use Android Material Design Animations for better User Experience Build Apps that Consume RESTful APIs Build Apps for Android Phones and Tablets Build Apps that Use Google Maps and Location Requirements You should be able to use a computer Willingness and drive to learn, strong work ethics, a doer mentality Who this course is for: Beginners, Intermediate, Expert Android App Developers Anyone who wants to learn how to build Amazing User Interfaces for Androids Apps using Material Design Anyone who wants to learn Java to build Android Material Design Apps

The Complete Android & Java Bootcamp - Material Design UI/UX
Delivered Online On Demand29 hours
£25

Certified Diploma in Outsourcing

By iStudy UK

Are you searching for a course that will show you how to outsource like a professional? If yes, then enrol now and master the unique techniques and skills for quarantine the success of a project. Knowing how to outsource successfully is an amazingly helpful skill whether you're a business visionary, a manager, an advertiser, or entrepreneur. Having the capacity to incorporate outsourcing into your venture, your business, or even your occupation can drastically change your rate of success. Learn how to outsource and make magic with your project's to-do list in this course. You'll be able to hit goals sooner while spending a fraction of what you planned. You will learn how to save your project by going lean and shifting your attention and resources to other crucial areas. Eventually, every organisation and start-up outsource in some way. Outsourcing has endless possibilities - you just need to know how to use it. Course Highlights Certified Diploma in Outsourcing is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Certified Diploma in Outsourcing into 9 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 5 hours, 40 minutes and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Certified Diploma in Outsourcing Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Certified Diploma in Outsourcing is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Certified Diploma in Outsourcing is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. WHY WOULD YOU OUTSOURCE? 00:15:00 DECIDING WHAT TO OUTSOURCE 00:30:00 FINDING CONTENT WRITERS 00:30:00 GRAPHIC DESIGNERS, WEBSITE DESIGNERS, ETC 00:30:00 CODERS AND PROGRAMMERS 01:00:00 VIRTUAL ASSISTANTS AND CUSTOMER SERVICE 00:30:00 OUTSOURCING SEO & PROMOTION 00:15:00 FREELANCE SITES AND HOW THEY WORK 01:00:00 OUTSOURCING ISSUES 00:30:00 Mock Exam Mock Exam-Certified Diploma in Outsourcing 00:20:00 Final Exam Final Exam-Certified Diploma in Outsourcing 00:20:00

Certified Diploma in Outsourcing
Delivered Online On Demand5 hours 40 minutes
£25

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

CompTIA Advanced Security Practitioner (CASP) - Video Training Course

4.3(43)

By John Academy

Description This CompTIA Advanced Security Practitioner (CASP) - Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Advanced Security Practitioner (CASP) - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Enterprise Security Architecture The Basics of Enterprise Security FREE 01:00:00 The Enterprise Structure 00:21:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:31:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 The Enterprise Structure 00:21:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Advanced Security Practitioner (CASP) - Video Training Course
Delivered Online On Demand19 hours 5 minutes
£24

AWS Tutorial: AWS Solutions Architect and SysOps Administrator

By Packt

This course covers the best practices required for AWS Solutions Architect and AWS SysOps Administrator. Explore real-time 3-tier architecture addressing security, high availability, scalability, and resource optimization. Basic knowledge of Linux and a desire to adopt cloud models are all you need to get started.

AWS Tutorial: AWS Solutions Architect and SysOps Administrator
Delivered Online On Demand12 hours 46 minutes
£33.99

Mastering Data Science and Machine Learning Fundamentals

By Packt

This course starts with the basics of data science and gradually moves towards explaining the concepts of machine learning and various data science algorithms.

Mastering Data Science and Machine Learning Fundamentals
Delivered Online On Demand1 hour 48 minutes
£33.99

Ubuntu Linux for Beginners

5.0(1)

By Course Gate

Acrobat DC, the updated version of Acrobat software that allows you to make an instant edit of scanned documents, create PDF, edit image or text, convert document file to word, and many more features at an instant. To learn the vivid use of these aforesaid features, take a look at our well-segmented Adobe Acrobat DC Pro Foundation course. The course teaches you how to navigate interface, bars, use tools, menus, and changes preferences. Following that, it teaches you how to work with PDF marking the texts, adding comments, and highlighting the contexts. Furthermore, it teaches you how to reduce the size, convert PDF to RTF, EXCEL, and Word files. In the end, it also enhances your skill to protect your file by adding a signature, creating security, and understanding accessibility. Who is this course for? Ubuntu Linux for Beginners is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Ubuntu Linux for Beginners is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Ubuntu Linux for Beginners THE COMPANY BEHIND UBUNTU 00:15:00 DOMAIN NAME SYSTEM ON UBUNTU 00:15:00 DDNS Changes 00:30:00 UFW ON UBUNTU 00:30:00 UFW FEATURES 00:15:00 MAIL SERVER ON UBUNTU Part 1 00:30:00 MAIL SERVER ON UBUNTU Part 2 00:15:00 KERBEROS AND FEDERATION SERVICES ON UBUNTU 00:30:00 WORKING WITH WEB SERVERS ON UBUNTU 00:15:00 WORKING WITH DATABASE SERVERS ON UBUNTU 00:15:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Ubuntu Linux for Beginners
Delivered Online On Demand3 hours 30 minutes
£11.99

Mikrotik with IPSEC VPN Tunnel

4.8(9)

By Skill Up

Profitably set up, manage and optimize professional retargeting campaigns and explore retargeting ads with the Retargeting Ads Guide

Mikrotik with IPSEC VPN Tunnel
Delivered Online On Demand3 hours 38 minutes
£25

Create Directory Website Using WordPress

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Create Directory Website Using WordPress
Delivered Online On Demand1 hour 41 minutes
£25

Modern PHP Web Development w/ MySQL, GitHub & Heroku

4.8(9)

By Skill Up

Accomplish your dream to become a web developer with the help of this comprehensive Modern PHP Web Development

Modern PHP Web Development w/ MySQL, GitHub & Heroku
Delivered Online On Demand12 hours 6 minutes
£25