• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4126 Computing courses in Pontypridd delivered On Demand

CompTIA Security+ (SY0-601)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

Enterprise Risk: Identification and Mitigation Level 2

4.9(27)

By Apex Learning

Overview This comprehensive course on Enterprise Risk: Identification and Mitigation Level 2 will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Enterprise Risk: Identification and Mitigation Level 2 comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Enterprise Risk: Identification and Mitigation Level 2. It is available to all students, of all academic backgrounds. Requirements Our Enterprise Risk: Identification and Mitigation Level 2 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 29 lectures • 01:12:00 total length •General Concepts: 00:02:00 •Risk in Society and Commerce: 00:03:00 •Risk Types: 00:04:00 •Theoretical Foundation of Enterprise Risk - Risk and Volatility: 00:03:00 •ARCH Model: 00:04:00 •Uncertainty, Complexity and Chaos: 00:03:00 •Complexity & Chaos: 00:03:00 •Non Linear Dynamics - System Theory: 00:04:00 •Qualitative Comparative Analysis (QCA): 00:02:00 •Quantitative Measurements of Risk: 00:01:00 •Statistical Tools - Value at Risk: 00:01:00 •Sampling, the Normal Distribution and Updating: 00:02:00 •Correlation and Regression: 00:02:00 •Value at Risk (VaR): 00:02:00 •Assessment: 00:02:00 •International Ratings & Basel: 00:03:00 •Standard & Poor's: 00:01:00 •Enterprise Risk Management - ERM: 00:02:00 •Components of Enterprise Risk Management: 00:02:00 •Implementing ERM in Practice: 00:02:00 •Insurance and Hedging: Insurance Contracts & Types: 00:02:00 •Volatility Uncertainly Complexity & Ambiguity (VUCA) Method: 00:03:00 •Strategic Risk Analysis & Corporate Compliance: Sensitivity Analysis: 00:02:00 •Framework for Using Sensitivity Analysis for Decision Making: 00:01:00 •Scenario Analysis - Stress Testing: 00:04:00 •Uses of Scenarios: 00:03:00 •Simulation - Monte Carlo Analysis: 00:03:00 •Corporate Compliance: 00:04:00 •SAP GRC Global Trade Services: 00:02:00

Enterprise Risk: Identification and Mitigation Level 2
Delivered Online On Demand1 hour 12 minutes
£12

CompTIA PenTest+ (Ethical Hacking)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Car Maintenance Level 3

4.9(27)

By Apex Learning

Become your own car expert! Learn vital maintenance skills to save on repairs and keep your vehicle in top shape. #CarMaintenance

Car Maintenance Level 3
Delivered Online On Demand7 hours 30 minutes
£12

Learn the Basics of Microsoft Visio in Only 30 minutes!

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn the Basics of Microsoft Visio in Only 30 minutes! will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn the Basics of Microsoft Visio in Only 30 minutes! comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn the Basics of Microsoft Visio in Only 30 minutes!. It is available to all students, of all academic backgrounds. Requirements Our Learn the Basics of Microsoft Visio in Only 30 minutes! is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 13 lectures • 00:33:00 total length •Unit 01: What is Microsoft Visio?: 00:01:00 •Unit 02: Where to get Microsoft Visio: 00:02:00 •Unit 03: Starting Visio and Templates: 00:06:00 •Unit 04: Starting a Cross-Functional Flowchart: 00:03:00 •Unit 05: Title and Swimlanes: 00:02:00 •Unit 06: Add Shapes, Texts and Connectors: 00:09:00 •Unit 07: Insert Containers: 00:01:00 •Unit 08: Shape Colors and Styles: 00:02:00 •Unit 09: Themes: 00:01:00 •Unit 10: Alignment and Spacing: 00:01:00 •Unit 11: Add Pages: 00:01:00 •Unit 12: Presentation Mode: 00:01:00 •Unit 13: Visio Web: 00:03:00

Learn the Basics of Microsoft Visio in Only 30 minutes!
Delivered Online On Demand33 minutes
£12

Tic-Tac-Toe Clone - The Complete SFML C++ Game Course

4.9(27)

By Apex Learning

Overview This comprehensive course on Tic-Tac-Toe Clone - The Complete SFML C++ Game Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Tic-Tac-Toe Clone - The Complete SFML C++ Game Course comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Tic-Tac-Toe Clone - The Complete SFML C++ Game Course. It is available to all students, of all academic backgrounds. Requirements Our Tic-Tac-Toe Clone - The Complete SFML C++ Game Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 20 lectures • 03:27:00 total length •Introduction: 00:02:00 •Project Setup On Windows: 00:12:00 •Project Setup On Mac: 00:10:00 •State Machine: 00:08:00 •Asset Manager: 00:08:00 •Input Manager: 00:08:00 •Game Loop: 00:14:00 •Splash State/Screen: 00:19:00 •Main Menu State/Screen: 00:20:00 •Game Over State/Screen: 00:08:00 •Pause State/Screen: 00:14:00 •Game Over State/Screen: 00:08:00 •Grid Part 1 - Initialisation: 00:14:00 •Grid Part 2 - Placing A Piece: 00:12:00 •Check For Win Condition: 00:20:00 •AI: 00:21:00 •Show Game Over Screen: 00:05:00 •What to Do Next?: 00:04:00 •Resource: 00:00:00 •Assignment - Tic-Tac-Toe Clone - The Complete SFML C++ Game Course: 2 days

Tic-Tac-Toe Clone - The Complete SFML C++ Game Course
Delivered Online On Demand3 hours 27 minutes
£12

Professional Certificate Course in Understanding the Role of MIS in Decision Making and Modeling in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course aims to provide a comprehensive understanding of decision-making processes and dynamics at the managerial level. The course aims to equip learners with knowledge and skills to apply various decision-making models, including decision support systems (DSS) and system modelling, to support effective organisational decision-making. Additionally, the course will enable learners to identify and prepare for trends in decision support and business intelligence and understand how management information systems can aid in decision-making. After the successful completion of the course, you will be able to learn about the following, Understand Decision-Making dynamics and process Types of decision-making, especially at the managerial level. Understanding and applying the decision-making models, including the decision support system (DSS) and its components. Analysing the Information Requirements of Key Decision-making Groups in a Firm. Identifying and preparing for trends in Decision Support and Business Intelligence. Understanding System Modelling and its Types. Learn about how Management Information Systems help in Decision Making. This course covers the fundamentals of decision-making processes and dynamics, including the types of decision-making at the managerial level. Learners will explore various decision-making models and their applications, focusing on decision support systems (DSS) and system modelling. They will gain an understanding of the components of DSS and their role in supporting effective decision-making. This course covers the fundamentals of decision-making processes and dynamics, including the types of decision-making at the managerial level. Learners will explore various decision-making models and their applications, with a particular focus on decision support systems (DSS) and system modeling. They will gain an understanding of the components of DSS and their role in supporting effective decision-making. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Understanding the Role of MIS in Decision Making, System Design, and Modeling Self-paced pre-recorded learning content on this topic. Understanding the Role of MIS in Decision Making and Modeling Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Managers at all levels Business analysts Decision support specialists IT professionals. Consultants & Project managers Entrepreneurs and business owners Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Understanding the Role of MIS in Decision Making and Modeling in London 2024
Delivered Online On Demand14 days
£35

IT Administration Principles and Best Practices

By Compliance Central

Are you looking to enhance your IT Administration skills? If yes, then you have come to the right place. Our comprehensive course on IT Administration will assist you in producing the best possible outcome by mastering the IT Administration skills. The IT Administration course is for those who want to be successful. In the IT Administration course, you will learn the essential knowledge needed to become well versed in IT Administration. Our IT Administration course starts with the basics of IT Administration and gradually progresses towards advanced topics. Therefore, each lesson of this IT Administration course is intuitive and easy to understand. IT Administration Curriculum Breakdown of the IT Administration Course Course Outline: Software Hardware Security Networking Basic IT Literacy Why would you choose the IT Administration course from Compliance Central: Lifetime access to IT Administration course materials Full tutor support is available from Monday to Friday with the IT Administration course Learn IT Administration skills at your own pace from the comfort of your home Gain a complete understanding of IT Administration course Accessible, informative IT Administration learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the IT Administration Study IT Administration in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your IT Administration Course CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The IT Administration course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in IT Administration. It is also great for professionals who are already working in IT Administration and want to get promoted at work. Requirements To enrol in this IT Administration course, all you need is a basic understanding of the English Language and an internet connection. Career path IT Administrator: £25,000 to £45,000 per year Systems Administrator: £30,000 to £50,000 per year Network Administrator: £30,000 to £55,000 per year Database Administrator: £35,000 to £60,000 per year IT Security Administrator: £35,000 to £65,000 per year Cloud Administrator: £40,000 to £70,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

IT Administration Principles and Best Practices
Delivered Online On Demand2 hours
£12

Functional Skills - IT

4.3(43)

By John Academy

Course Overview Learn all the essential skills to become an expert in Functional IT. From this comprehensive Functional Skills - IT course, you will be able to understand the principles of Functional IT. In the step-by-step training process, you will acquire practical skills along with theoretical knowledge. The Qualified professionals will assist you throughout this learning process. This Functional Skills - IT is structured to ensure you have all the adequate skills to secure a position in this competitive industry. You will achieve the confidence and competency to bear all the responsibilities of this profession. The course will add all the right credentials to your resume and increase your employability in this growing industry. Learning Outcomes Get a deep understanding of the fundamentals of Information Technology (IT) Master all the IT Components Understand how operating systems work Master software building tools and languages Learn how information flows within IT and how Storage Companies and Technologies work Who is this course for? Anyone who is now employed in this field or who aspires to be one should take this course. Your knowledge will grow through taking this course, which will also strengthen your resume. To demonstrate your newly gained knowledge, develop crucial abilities and receive a professional credential. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Functional Skills - IT course is intended to assist you in obtaining the dream job or maybe the promotion you've always desired. With the assistance and direction of our Functional Skills - IT course, learn the vital abilities and knowledge you require to succeed in your life. Section 01: Introduction Unit 01: Introduction 00:01:00 Unit 02: Course Outline 00:06:00 Section 02: Information Technology Unit 01: Facts about Information Technology (IT) 00:05:00 Unit 02: What is Information Technology & How IT Works 00:02:00 Section 03: Components of IT Unit 01: IT Components 00:02:00 Section 04: Hardware Unit 01: What is Hardware 00:02:00 Unit 02: Examples of Computer 00:02:00 Unit 03: Computer Hardware Manufacturers 00:04:00 Unit 04: Hardware Jobs 00:05:00 Section 05: Operating System Unit 01: What is Operating System 00:02:00 Unit 02: Examples of Operating System 00:08:00 Unit 03: Operating System Jobs 00:10:00 Unit 04: OS Tools Related Jobs 00:02:00 Section 06: Application/Software Unit 01: What is Application/Software 00:03:00 Unit 02: Software Building Tools and Languages 00:03:00 Unit 03: Software/Application Building Jobs 00:03:00 Unit 04: Software/Application User Jobs 00:03:00 Section 07: Networking Unit 01: What is Computer Networking 00:02:00 Unit 02: Computer Network Companies 00:02:00 Unit 03: Network Jobs 00:04:00 Section 08: Security Unit 01: What is Computer Security 00:02:00 Unit 02: Security Companies 00:01:00 Unit 03: Security Jobs 00:03:00 Section 09: Traffic Flow & Enterprise Level IT Components Unit 01: How Information Flow within IT 00:02:00 Unit 02: Enterprise Level IT Components 00:02:00 Section 10: Storage Unit 01: What is Storage 00:05:00 Unit 02: Storage Companies and Technologies 00:02:00 Unit 03: Jobs in Storage 00:02:00 Section 11: Database Unit 01: What is Database 00:02:00 Unit 02: Database Type and Technologies 00:04:00 Unit 03: Database Jobs 00:02:00 Section 12: Virtualisation & Cloud Unit 01: What is Virtualisation 00:03:00 Unit 02: What is Cloud Technology 00:02:00 Unit 03: Virtualisation and Cloud Companies 00:02:00 Unit 04: Virtualisation and Cloud Jobs 00:02:00 Section 13: Management & Other IT Jobs Unit 01: IT Management Jobs 00:03:00 Unit 02: Other IT Jobs 00:09:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Functional Skills - IT
Delivered Online On Demand1 hour 59 minutes
£11.99

JavaScript Promises

By IOMH - Institute of Mental Health

Overview This JavaScript Promises course will unlock your full potential and will show you how to excel in a career in JavaScript Promises. So upskill now and reach your full potential. Everything you need to get started in JavaScript Promises is available in this course. Learning and progressing are the hallmarks of personal development. This JavaScript Promises will quickly teach you the must-have skills needed to start in the relevant industry. In This JavaScript Promises Course, You Will: Learn strategies to boost your workplace efficiency. Hone your JavaScript Promises skills to help you advance your career. Acquire a comprehensive understanding of various JavaScript Promises topics and tips from industry experts. Learn in-demand JavaScript Promises skills that are in high demand among UK employers, which will help you to kickstart your career. This JavaScript Promises course covers everything you must know to stand against the tough competition in the JavaScript Promises field.  The future is truly yours to seize with this JavaScript Promises. Enrol today and complete the course to achieve a JavaScript Promises certificate that can change your professional career forever. Additional Perks of Buying a Course From Institute of Mental Health Study online - whenever and wherever you want. One-to-one support from a dedicated tutor throughout your course. Certificate immediately upon course completion 100% Money back guarantee Exclusive discounts on your next course purchase from Institute of Mental Health Enrolling in the JavaScript Promises course can assist you in getting into your desired career quicker than you ever imagined. So without further ado, start now. Process of Evaluation After studying the JavaScript Promises course, your skills and knowledge will be tested with a MCQ exam or assignment. You must get a score of 60% to pass the test and get your certificate.  Certificate of Achievement Upon successfully completing the JavaScript Promises course, you will get your CPD accredited digital certificate immediately. And you can also claim the hardcopy certificate completely free of charge. All you have to do is pay a shipping charge of just £3.99. Who Is This Course for? This JavaScript Promises is suitable for anyone aspiring to start a career in JavaScript Promises; even if you are new to this and have no prior knowledge on JavaScript Promises, this course is going to be very easy for you to understand.  And if you are already working in the JavaScript Promises field, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  Taking this JavaScript Promises course is a win-win for you in all aspects.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements This JavaScript Promises course has no prerequisite.  You don't need any educational qualification or experience to enrol in the JavaScript Promises course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online JavaScript Promises course. Moreover, this course allows you to learn at your own pace while developing transferable and marketable skills. Course Curriculum Section 01: JavaScript Promises What's the point of this course? 00:03:00 Section 02: Understanding Promises Understanding Promises 00:03:00 Why do promises exist? 00:03:00 The Untenable Inconsistency of Promises 00:05:00 Section 03: Using Promises Why use promises? / The Promise Specification / Standard Promise Usage 00:04:00 Demo: Standard Promise Usage 00:07:00 Returning Promises 00:05:00 Demo: Implementing the Promise Spec 00:10:00 Async/Await and Promises 00:01:00 Demo: Async/Await and Promises 00:04:00 Section 04: Multiple Promises About Multiple Promises / Chaining Promises 00:03:00 Demo: Chaining Promises 00:04:00 Promise Utilities 00:04:00 Demo: Promise Utilities race, any and all 00:08:00 Section 05: Handling Errors with Promises What happens when an error happens inside a promise? 00:03:00 Demo: Handling Errors with Promises 00:08:00 Course Summary 00:02:00

JavaScript Promises
Delivered Online On Demand1 hour 17 minutes
£11