• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Computing courses delivered Online

We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.

Know someone teaching this? Help them become an Educator on Cademy.

1...738

Online Options

Show all 5814

Oracle SQL Fundamentals, 3 Days

4.6(12)

By PCWorkshops

At this Oracle SQL Fundamentals course, we cover SQL queries, group by's , aggregates, joins, date-functions, String Functions, Random Functions, Math Functions, Insert, update and delete, Creating and changing tables, sub-queries in detail, views, stored procedures, custom functions, and table variables. Course level is beginners to intermediate.

Oracle SQL Fundamentals, 3 Days
Delivered Online + more
£750

App in a day

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Looking for a way to extend your business operations? Look no further than the App in a Day workshop! In this one day course you will learn to build a custom, secure business application that you can share across your organise and will run across multiple platforms including tablets and mobile devices. Power Platform is a secure and scalable platform for building your own applications. In this course, you will learn how to build an application from the ground up by building the required UX, Backend, and frontend. All this without writing any code. Overview Some of the applications of the Power Platform you will learn to build will allow you to potentially: A) Share information with trusted colleagues and associates B) Monitor and manage your business operations C) Monitor and manage your customers D) Share business news on social media E) Share business photos and footage This course will teach you how to build your own application that is completely secure and private. Power Apps Canvas App Connect to data sources and filter results based on specified criteria Work with screens and navigation Use controls, properties, formulas, and actions to customize the user experience Display the logged in user?s name Configure app settings Save and share an app Run an app on a mobile device Microsoft Dataverse Create and customize a custom table Use the Form control Save data into the Microsoft Dataverse using the Form control Microsoft Dataverse Create a standalone Model-driven app. Customize forms for the Model-driven app Use a Business Process Flow to guide users through a process Microsoft Dataverse Create a flow that is triggered when a new Microsoft Dataverse row is created Automate sending approval requests Customize the approval based on the Microsoft Dataverse row Use the Approval centre

App in a day
Delivered Online
£450

Data Analytics BootCamp, 12-weeks, Online Instructor-led

4.6(12)

By PCWorkshops

PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.

Data Analytics BootCamp, 12-weeks, Online Instructor-led
Delivered Online + more
£1,200

Python Data Analytics Course

4.6(12)

By PCWorkshops

Python Data Analytics with Python using Numpy, Pandas, Dataframes. Most attendees are in-work Data Professional. Private individuals are very welcome. Our Style: Hands-on, Practical Location: Online, Instructor-led

Python Data Analytics Course
Delivered Online + more
£185

Python Unittest Course

4.6(12)

By PCWorkshops

Python Unittest Course Summary. Testing plays a major role in software development. This course will explain Python Unit Testing using the unittest built-in module. We'll cover issues before going to the production itself and the basics of testing in Python. Location: Instructor-led, Online. Our Style: Hands-on, Practical Course. Group Size: Max 4 people per group. Qualification: PCWorkshops Unittest Certification Duration: 1-Day, 10am-5pm Unittest topics UnitTest Framework - Home UnitTest Framework - Overview UnitTest - Framework UnitTest - API UnitTest - Assertion UnitTest - Test Discovery UnitTest - Skip Test UnitTest - Exceptions Test UnitTest - Time Test UnitTest - Unittest2 UnitTest - Signal Handling UnitTest - Doctest UnitTest - Doctest API UnitTest - Py.test Module Nose Testing - Framework Nose Testing - Tools Included with Python Unittest Course Python Unittest Certificate on completion Python Unittest Videos Python Unittest Notes Python Unittest Examples Practical Python Unittest exercises

Python Unittest Course
Delivered Online + more
£120

Android Studio Taster 1-Hour Course

4.6(12)

By PCWorkshops

Android Studio Taster Course. Brilliant for a beginner to get started quickly. introduction to the Android Studio environment, to get you started. An interesting and fun session. Hands-on, Practical Course, Instructor-led. 1 hour In our London classroom or online with Gotomeeting.com

Android Studio Taster 1-Hour Course
Delivered Online + more
£15

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

AZ-900T00 Microsoft Azure Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - Describe cloud computing What is cloud computing Describe the shared responsibility model Define cloud models Describe the consumption-based model 2 - Describe the benefits of using cloud services Describe the benefits of high availability and scalability in the cloud Describe the benefits of reliability and predictability in the cloud Describe the benefits of security and governance in the cloud Describe the benefits of manageability in the cloud 3 - Describe cloud service types Describe Infrastructure as a Service Describe Platform as a Service Describe Software as a Service 4 - Describe the core architectural components of Azure What is Microsoft Azure Get started with Azure accounts Describe Azure physical infrastructure Describe Azure management infrastructure 5 - Describe Azure compute and networking services Describe Azure Virtual Machines Describe Azure Virtual Desktop Describe Azure Containers Describe Azure Functions Describe application hosting options Describe Azure Virtual Networking Describe Azure Virtual Private Networks Describe Azure ExpressRoute Describe Azure DNS 6 - Describe Azure storage services Describe Azure storage accounts Describe Azure storage redundancy Describe Azure storage services Identify Azure data migration options Identify Azure file movement options 7 - Describe Azure identity, access, and security Describe Azure directory services Describe Azure authentication methods Describe Azure external identities Describe Azure conditional access Describe Azure role-based access control Describe zero trust model Describe defense-in-depth Describe Microsoft Defender for Cloud 8 - Describe cost management in Azure Describe factors that can affect costs in Azure Compare the Pricing and Total Cost of Ownership calculators Describe the Microsoft Cost Management tool Describe the purpose of tags 9 - Describe features and tools in Azure for governance and compliance Describe the purpose of Microsoft Purview Describe the purpose of Azure Policy Describe the purpose of resource locks Describe the purpose of the Service Trust portal 10 - Describe features and tools for managing and deploying Azure resources Describe tools for interacting with Azure Describe the purpose of Azure Arc Describe Azure Resource Manager and Azure ARM templates 11 - Describe monitoring tools in Azure Describe the purpose of Azure Advisor Describe Azure Service Health Describe Azure Monitor Additional course details: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-900T00 Microsoft Azure Fundamentals
Delivered Online + more
£1,190

CompTIA A+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 1 220-1101 Certification Exam and the CompTIA A+ Core 2 220-1102 Certification Exam. Overview On course completion, participants will be able to: Support operating systems. Install and configure PC system unit components and peripheral devices. Install, configure, and troubleshoot display and multimedia devices. Install, configure, and troubleshoot storage devices. Install, configure, and troubleshoot internal system components. Install, configure, and maintain operating systems. Maintain and troubleshoot Microsoft Windows. Explain network infrastructure concepts. Configure and troubleshoot network connections. Manage users, workstations, and shared resources. Implement client virtualization and cloud computing. Implement physical security. Secure workstations and data. Troubleshoot workstation security issues. Support and troubleshoot laptops. Support and troubleshoot mobile devices. Install, configure, and troubleshoot print devices. Implement operational procedures. CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. 1 - Installing Motherboards and Connectors Explain Cable Types and Connectors Install and Configure Motherboards Explain Legacy Cable Types 2 - Installing System Devices Install and Configure Power Supplies and Cooling Select and Install Storage Devices Install and Configure System Memory Install and Configure CPUs 3 - Troubleshooting PC Hardware Apply Troubleshooting Methodology Configure BIOS/UEFI Troubleshoot Power and Disk Issues Troubleshoot System and Display Issues 4 - Comparing Local Networking Hardware Compare Network Types Compare Networking Hardware Explain Network Cable Types Compare Wireless Networking Types 5 - Configuring Network Addressing and Internet Connections Compare Internet Connection Types Use Basic TCP/IP Concepts Compare Protocols and Ports Compare Network Configuration Concepts 6 - Supporting Network Services Summarize Services Provided by Networked Hosts Compare Internet and Embedded Appliances Troubleshoot Networks 7 - Summarizing Virtualization and Cloud Concepts Summarize Client-Side Virtualization Summarize Cloud Concepts 8 - Supporting Mobile Devices Set Up Mobile Devices and Peripherals Configure Mobile Device Apps Install and Configure Laptop Hardware Troubleshoot Mobile Device Issues 9 - Supporting Print Devices Deploy Printer and Multifunction Devices Replace Print Device Consumables Troubleshoot Print Device Issues 10 - Configuring Windows Configure Windows User Settings Configure Windows System Settings 11 - Managing Windows Use Management Consoles Use Performance and Troubleshooting Tools Use Command-line Tools 12 - Identifying OS Types and Features Explain OS Types Compare Windows Editions 13 - Supporting Windows Perform OS Installations and Upgrades Install and Configure Applications Troubleshoot Windows OS Problems 14 - Managing Windows Networking Manage Windows Networking Troubleshoot Windows Networking Configure Windows Security Settings Manage Windows Shares 15 - Managing Linux and macOS Identify Features of Linux Identify Features of macOS 16 - Configuring SOHO Network Security Explain Attacks, Threats, and Vulnerabilities Compare Wireless Security Protocols Configure SOHO Router Security Summarize Security Measures 17 - Managing Security Settings Configure Workstation Security Configure Browser Security Troubleshoot Workstation Security Issues 18 - Supporting Mobile Software Configure Mobile OS Security Troubleshoot Mobile OS and App Software Troubleshoot Mobile OS and App Security 19 - Using Support and Scripting Tools Use Remote Access Technologies Implement Backup and Recovery Explain Data Handling Best Practices Identify Basics of Scripting 20 - Implementing Operational Procedures Implement Best Practice Documentation Use Proper Communication Techniques Use Common Safety and Environmental Procedures

CompTIA A+
Delivered Online + more
£2,475

MS-900T01 Microsoft 365 Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for candidates looking to demonstrate foundational-level knowledge of cloud-based solutions to facilitate productivity and collaboration on-site, at home, or a combination of both.ÿCandidates may have knowledge of cloud-based solutions or may be new to Microsoft 365. Overview After completing this course, students will be able to: Describe cloud concepts Describe core Microsoft 365 services and concepts Describe security, compliance, privacy, and trust in Microsoft 365 Describe Microsoft 365 pricing and support This course introduces Microsoft 365, an integrated cloud platform that delivers industry-leading productivity apps along with intelligent cloud services, and world-class security. You?ll learn foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing. You will be introduced to Microsoft 365 and learn how Microsoft 365 solutions improve productivity, facilitate collaboration, and optimize communications. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support. 1 - Describe cloud computing What is cloud computing Describe the shared responsibility model Define cloud models Describe the consumption-based model 2 - Describe the benefits of using cloud services Describe the benefits of high availability and scalability in the cloud Describe the benefits of reliability and predictability in the cloud Describe the benefits of security and governance in the cloud Describe the benefits of manageability in the cloud 3 - Describe cloud service types Describe Infrastructure as a Service Describe Platform as a Service Describe Software as a Service 4 - What is Microsoft 365? Describe the differences between Office 365 and Microsoft 365 Describe Windows 365 Describe how Microsoft 365 empowers workers in this hybrid world of work Explore Microsoft 365 tenant 5 - Describe productivity solutions of Microsoft 365 Describe the productivity capabilities and benefits of Microsoft 365 Describe Microsoft 365 Apps Describe work management tools in Microsoft 365 Describe additional Microsoft 365 productivity apps 6 - Describe collaboration solutions of Microsoft 365 Describe the collaboration capabilities and benefits of Microsoft 365 Describe how Microsoft Teams promotes collaboration and enhances teamwork Describe the Microsoft Viva apps Describe how Yammer helps communities connect and grow 7 - Describe endpoint modernization, management concepts, and deployment options in Microsoft 365 Describe the endpoint management capabilities of Microsoft 365 Compare the differences of Windows 365 and Azure Virtual Desktop Describe the deployment and release models for Windows-as-a-Service (WaaS) Identify deployment methods and update channels for Microsoft 365 Apps 8 - Describe analytics capabilities of Microsoft 365 Describe the capabilities of Viva Insights Describe the capabilities of the Microsoft 365 admin center and Microsoft 365 user portal Describe the reports available in the Microsoft 365 admin center and other admin centers 9 - Describe the services and identity types of Azure AD Describe Azure Active Directory Describe the available Azure AD editions Describe Azure AD identity types Describe the types of external identities Describe the concept of hybrid identity 10 - Describe the access management capabilities of Azure AD Describe Conditional Access in Azure AD Describe the benefits of Azure AD roles and role-based access control 11 - Describe threat protection with Microsoft 365 Defender Describe Microsoft 365 Defender services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe the Microsoft 365 Defender portal 12 - Describe security capabilities of Microsoft Sentinel Describe how Microsoft Sentinel provides integrated threat management Understand Sentinel costs 13 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 14 - Describe the Service Trust Portal and privacy at Microsoft Describe the Service Trust Portal Describe Microsoft's privacy principles Describe Microsoft Priva 15 - Describe Microsoft 365 pricing, licensing, and billing options Explore pricing models for Microsoft cloud services Explore the billing and bill management options Explore the available licensing and management options 16 - Describe support offerings for Microsoft 365 services Explore support options for Microsoft 365 services Explain service level agreement (SLAs) concepts Identify how to track the service health status Explore how organizations can share feedback on Microsoft 365 services

MS-900T01 Microsoft 365 Fundamentals
Delivered Online
£595