• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37029 Courses in Cardiff delivered Online

Flutter & Dart Development for Building iOS and Android Apps

4.9(27)

By Apex Learning

Overview This comprehensive course on Flutter & Dart Development for Building iOS and Android Apps will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Flutter & Dart Development for Building iOS and Android Apps comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Flutter & Dart Development for Building iOS and Android Apps. It is available to all students, of all academic backgrounds. Requirements Our Flutter & Dart Development for Building iOS and Android Apps is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 116 lectures • 09:41:00 total length •Introduction: 00:02:00 •Setup On Windows: 00:16:00 •Setup On Linux: 00:14:00 •Setup On Mac iOS: 00:14:00 •Setup On Mac Android: 00:12:00 •App Base Code: 00:03:00 •Text: 00:04:00 •Container.: 00:04:00 •Row.: 00:05:00 •Column.: 00:00:00 •Stack.: 00:02:00 •Image.: 00:06:00 •Center.: 00:02:00 •Padding.: 00:03:00 •Align.: 00:02:00 •Constrained Box.: 00:03:00 •Baseline Class.: 00:03:00 •Aspect Ratio: 00:03:00 •Sized Box: 00:02:00 •Transform: 00:03:00 •Pointers.: 00:06:00 •Tap.: 00:02:00 •Double Tap.: 00:02:00 •Long Press.: 00:03:00 •Vertical Drag.: 00:04:00 •Horizontal Drag.: 00:04:00 •Pan.: 00:04:00 •Scaffold.: 00:06:00 •App bar.: 00:05:00 •Bottom Navigation Bar.: 00:08:00 •TabBar View: 00:07:00 •Drawer.: 00:05:00 •SliverApp Bar: 00:07:00 •FlatButton: 00:04:00 •RaisedButton: 00:03:00 •DropdownButton: 00:09:00 •TextField: 00:04:00 •CheckBox.: 00:06:00 •Radio Button: 00:04:00 •PopupMenuButton: 00:07:00 •IconButton: 00:04:00 •ButtonBar: 00:03:00 •Floating Action Button: 00:04:00 •Switch.: 00:04:00 •Slider.: 00:05:00 •Date Picker.: 00:05:00 •Time Picker.: 00:07:00 •SimpleDialog.: 00:08:00 •AlertDialog: 00:06:00 •BottomSheet: 00:06:00 •Expansion Panel List and Expansion Panel: 00:07:00 •SnackBar: 00:07:00 •Cupertino Setup: 00:02:00 •Cupertino Action Sheet: 00:06:00 •Cupertino Activity Indicator: 00:01:00 •Cupertino Alert Dialog: 00:04:00 •Cupertino Button: 00:03:00 •CupertinoPageScaffold: 00:04:00 •CupertinoPicker: 00:04:00 •CupertinoPopupSurface: 00:04:00 •CupertinoSegmentedControl: 00:04:00 •CupertinoSlider: 00:04:00 •CupertinoSwitch: 00:03:00 •CupertinoNavigationBar: 00:04:00 •CupertinoTabBar: 00:05:00 •CupertinoTabScaffold: 00:04:00 •CupertinoTextField: 00:04:00 •Icons.: 00:04:00 •Chip.: 00:03:00 •Tooltip.: 00:02:00 •DataTable.: 00:09:00 •Card.: 00:06:00 •Linear Progress Indicator.: 00:03:00 •Circular Progress Indicator.: 00:04:00 •GridView: 00:03:00 •ListView & ListTile: 00:04:00 •Stepper & Step: 00:07:00 •Divider & divideTiles: 00:05:00 •Aligning Widgets: 00:03:00 •Sizing Widgets: 00:03:00 •Nesting Rows and Columns.: 00:03:00 •Add, Update and Delete Widgets: 00:06:00 •Navigate To A New Screen and Back.: 00:06:00 •Multiple Files For Each Screen: 00:03:00 •Send Data To A New Screen: 00:05:00 •Return Data From A Screen.: 00:05:00 •Navigate With Named Routes: 00:03:00 •Animating A Widget Across Screens: 00:02:00 •Tween Animation: 00:07:00 •Staggered Animation: 00:04:00 •Reverse and Stop Animations: 00:02:00 •Call Android Java Code: 00:08:00 •Send Parameters To Android Java Code: 00:07:00 •Call Android Kotlin Code: 00:08:00 •Send Parameters To Android Kotlin Code: 00:05:00 •Call iOS Objective-C Code: 00:10:00 •Send Parameters To iOS Objective-C Code: 00:05:00 •Call iOS Swift Code: 00:08:00 •Send Parameters To iOS Swift Code: 00:05:00 •Remove Debug Badge: 00:01:00 •Build & Release For Android: 00:04:00 •Build & Release For iOS: 00:06:00 •Fetch Data From The Internet: 00:13:00 •Making authenticated requests using HTTP Headers: 00:03:00 •Parsing JSON In The Background: 00:17:00 •Working With WebSockets: 00:10:00 •Reading & Writing Files On The Server Using SQL Injection Vulnerability.: 00:06:00 •Storing Key-Value Data On Disk: 00:03:00 •Data Persistence Using SQLite: 00:04:00 •Calculator Part 1 - TabBar Creation: 00:12:00 •Calculator Part 2 - Implementing The Tabs: 00:05:00 •Calculator Part 3 - Tab Persistence: 00:03:00 •Changing Android App Icon: 00:05:00 •Changing iOS App Icon: 00:01:00 •Change App Display Name.: 00:05:00 •Assignment - Flutter & Dart Development for Building iOS and Android Apps: 00:00:00

Flutter & Dart Development for Building iOS and Android Apps
Delivered Online On Demand9 hours 41 minutes
£12

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

4.9(27)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

Learn Ethical Hacking From A-Z: Beginner To Expert

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£12

Wedding Photography

4.9(27)

By Apex Learning

Overview This comprehensive course on Wedding Photography will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Wedding Photography comes with accredited certification which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is this course for? There is no experience or previous qualifications required for enrolment on this Wedding Photography. It is available to all students, of all academic backgrounds. Requirements Our Wedding Photography is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 8 sections • 78 lectures • 04:41:00 total length •01. introduction ##00 00:02:00 •01. Introduction ##01 What is this course all about: 00:01:00 •01. Introduction ##02 Who am I: 00:01:00 •01. Introduction ##03 Top 5 Tips for Better Wedding Photos: 00:03:00 •01. Introduction ##04 Why should you Become a Wedding photographer: 00:02:00 •01. Introduction ##05 How to Succeed with this course: 00:01:00 •01. Introduction ##06 Live Posing Session: 00:13:00 •02. Setting Up Your Business ##01 Section Intro: 00:01:00 •02. Setting Up your Business ##02 What Type of Wedding Photographer are you: 00:03:00 •02. Setting Up Your Business ##03 Equipment You Need toGet Started: 00:05:00 •02. Setting Up Your Business ##04 What Camera Brand is Best: 00:02:00 •02. Setting Up Your Business ##05 Where Should you buy Camera equipment: 00:01:00 •02. Setting Up Your Business ##06 Picking a Name for Your Company: 00:03:00 •02 Setting Up Your Business ##07 Launching a Website - Top Tips for a Successful Site: 00:05:00 •02. Setting Up Your Business ##08 Action Item-Pick a Name & Build a Website: 00:01:00 •02. Setting Up Your Business ##09 Creating Wedding Photography Packages: 00:05:00 •02. Setting Up Your Busines ##10 Pricing for Success: 00:09:00 •02. Setting Up Your Busines ##11 How to Get Your First Client: 00:04:00 •02. Setting Up Your Busines ##12 The Importance of Contracts: 00:03:00 •02. Setting Up Your Busines ##13 The Wedding Photography: 00:02:00 •02. Setting Up Your Busines ##15 Recap - Setting up your business: 00:02:00 •03. Wedding Day Overview ##01 Section Intro: 00:02:00 •03. Wedding Day Overview ##02 Taking Care of Business on the Wedding Day: 00:02:00 •03. Wedding Day Overview ##03 Overview of What to Photograph: 00:12:00 •03. Wedding Day Overview ##04 Using Pinterest to find Inspirational Photos: 00:02:00 •03. Wedding Day Overview ##05 Recap of Wedding Overview: 00:01:00 •04. How to Shoot a Wedding ##01 Section Intro: 00:03:00 •04. How to Shoot a Wedding ##02 Wedding Day Equipment Check: 00:05:00 •04. How to Shoot a Wedding ##03 Wedding Day Consideration-Day-Night-Indoor-Outdoor: 00:03:00 •04. How to Shoot a Wedding ##04 Do You Need an Assistant or Second Shooter: 00:04:00 •04. How to Shoot a Wedding ##05 How Much to Pay a second Shooter: 00:01:00 •04. How to Shoot a Wedding ##06 Scheduling the Wedding Day (First, Looks, Candide, Posed Family Shits): 00:02:00 •04. How to Shoot a Wedding ##07 Achieving Your Look: 00:01:00 •04. How to Shoot a Wedding ##08 Details: 00:05:00 •04. How to Shoot a Wedding ##09 Groom Preparation: 00:09:00 •04. How to Shoot a Wedding ##10 Bride Preparation: 00:11:00 •04. How to Shoot a Wedding ##11 Walking Down the Aisle: 00:04:00 •04. How to Shoot a Wedding ##12 Ceremony Coverage: 00:12:00 •04. How to Shoot a Wedding ##13 Readers: 00:03:00 •04. How to Shoot a Wedding ##14 Rings, Vows,Kiss: 00:03:00 •04. How to Shoot a Wedding ##15 Post-Ceremony: 00:05:00 •04. How to Shoot a Wedding ##16 How to Shoot Family Shots: 00:08:00 •04. How to Shoot a Wedding ##17 Posed Couple Shots: 00:13:00 •04. How to Shoot a Wedding ##18 Grand Entrance: 00:01:00 •04. How to Shoot a Wedding ##19 Reception Details: 00:06:00 •04. How to Shoot a Wedding ##20 Toast and Speeches: 00:06:00 •04. How to Shoot a Wedding ##21 Cake Cutting: 00:03:00 •04. How to Shoot a Wedding ##22 First Dance: 00:06:00 •04. How to Shoot a Wedding ##23 Bouquet Garter Toss: 00:03:00 •04. How to Shoot a Wedding ##24 Dance Party: 00:06:00 •04. How to Shoot a Wedding ##25 Recap - How to Shoot a Wedding: 00:01:00 •05. Editing Wedding Photos ##01 section Intro: 00:01:00 •05. Editing Wedding Photos ##02 Choosing an Editing App: 00:02:00 •05. Editing Wedding Photos ##03 Editing in Lightroom: 00:10:00 •05. Editing Wedding Photos ##04 Exporting from Lightroom: 00:03:00 •05. Editing Wedding Photos ##05 Editing in Photoshop: 00:11:00 •05. Editing Wedding Photos ##06 Creating Online Galleries: 00:06:00 •05. Editing Wedding Photos ##07 Recap of Editing Section: 00:01:00 •06. Succeeding Wedding Photography ##01 Section Intro: 00:01:00 •06. Succeeding Wedding Photography ##02 Being Happy - Tips from a Wedding Photographer: 00:01:00 •06. Succeeding Wedding Photography ##03 Making it a Business and Sticking to it: 00:02:00 •06. Succeeding Wedding Photography ##04 Building Out Your Portfolio: 00:01:00 •06. Succeeding Wedding Photography ##05 Dealing With Saturated Photography Markets: 00:02:00 •06. Succeeding Wedding Photography ##06 Competing With Family Photographers for Jobs: 00:01:00 •06. Succeeding Wedding Photography ##07 Working With Other Vendors for Success: 00:01:00 •06. Succeeding Wedding Photography ##08 Using Social Networks to Expand Your Business: 00:02:00 •06. Succeeding Wedding Photography ##09 Testimonials - Yelp, Wedding Wire, The Knot: 00:02:00 •06. Succeeding Wedding Photography ##10 Recap Succeeding With Wedding Photography: 00:01:00 •07. Wrap Up ##01 Thank You and What's Next: 00:01:00 •08. Bonus Engagement Photography ##01 Section Intro: 00:01:00 •08. Bonus Engagement Photography ##02 Equipment Check for the Engagement Photo Session: 00:01:00 •08. Bonus Engagement Photography ##03 How Much To Charge for an engagement Session: 00:01:00 •08. Bonus Engagement Photography ##04 Picking the Perfect Location for Engagement Photos: 00:02:00 •08. Bonus Engagement Photography ##05 Tips for Posing and Interacting with Clients for engagement Photos: 00:01:00 •08. Bonus Engagement Photography ##06 Engagement Photo Review: 00:07:00 •08. Bonus Engagement Photography ##07 Bonus Engagement Recap: 00:01:00 •How to Use Pinterest to Find Great Wedding Poses: 00:02:00 •How-to-Register-a-Domain-Name-with-Godaddy-with-a-Promo-Code: 00:04:00

Wedding Photography
Delivered Online On Demand4 hours 41 minutes
£12

CompTIA A+ (220-1001)

4.9(27)

By Apex Learning

Overview Having a foundational understanding of IT components is essential. Did you know that by 2023, an estimated 2.5 million new IT positions will be available globally? The CompTIA A+ (220-1001) course offers a comprehensive dive into the world of computer technology.  Designed to shape the professionals of tomorrow, this course meticulously covers the gamut of fundamental IT knowledge. Ranging from RAM technology to the vast world of cloud computing, the curriculum is structured to foster a comprehensive understanding. With modules such as 'Inside the PC' and 'Understanding Virtualization', learners will be adept at navigating the complex terrains of the modern IT environment. Ready to steer your career into the future of IT? Enrol now and become a part of the technological revolution! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1001). It is available to all students, of all academic backgrounds. Requirements Our CompTIA A+ (220-1001) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 24 sections • 132 lectures • 17:30:00 total length •CompTIA A+ 2019 Core 1 (220-1001) Course Introduction: 00:02:00 •What is the CompTIA A+?: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 1 (220-1001) Exam?: 00:09:00 •How to Pass the A+ Exam: 00:04:00 •How to Use This Video Course: 00:03:00 •Tools of the Trade: 00:06:00 •Troubleshooting Theory: 00:10:00 •Primary PC Connections: 00:05:00 •External Connections: 00:11:00 •Inside the PC: 00:08:00 •What is a Computer?: 00:07:00 •What is a CPU?: 00:15:00 •CPU Speeds and Cores: 00:12:00 •Caching: 00:07:00 •CPU Sockets: 00:12:00 •Installing a CPU: 00:11:00 •Liquid Cooling: 00:04:00 •RAM Technology: 00:11:00 •RAM Capacity: 00:08:00 •RAM Features: 00:07:00 •Installing RAM: 00:07:00 •What is the BIOS?: 00:06:00 •POST: 00:09:00 •System Setup: 00:09:00 •Troubleshooting Firmware: 00:12:00 •Form Factors: 00:06:00 •Chipsets: 00:05:00 •Touring the Motherboard: 00:14:00 •Touring the Case: 00:07:00 •Installing a Motherboard: 00:09:00 •The Power Supply: 00:09:00 •Mounting a Power Supply: 00:05:00 •Choosing a Power Supply: 00:08:00 •Cooling Your PC: 00:11:00 •Troubleshooting Power Supplies: 00:09:00 •Troubleshooting Core Components: 00:14:00 •Introduction to Mass Storage: 00:13:00 •Magnetic Disk Drives: 00:08:00 •Solid State Drives: 00:08:00 •SCSI: 00:03:00 •Boot Order: 00:07:00 •New Installation - First Drive: 00:05:00 •RAID: 00:11:00 •Hardware RAID: 00:07:00 •Mass Storage Troubleshooting: 00:08:00 •Optical Media: 00:10:00 •USB Standards: 00:10:00 •Understanding USB: 00:11:00 •Configuring USB: 00:07:00 •Thunder and Lightning: 00:06:00 •Keyboards and Mice: 00:08:00 •Sight and Sound: 00:07:00 •Readers and Scanners: 00:08:00 •Using Expansion Cards: 00:08:00 •The Right PC for the Job: 00:13:00 •Monitor Technologies: 00:08:00 •LCD Breakdown: 00:04:00 •Graphics Cards and Connections: 00:13:00 •Installing a Graphics Card: 00:07:00 •Projectors: 00:05:00 •Troubleshooting Monitors: 00:06:00 •Introduction to Networking: 00:08:00 •Hubs vs. Switches: 00:05:00 •Hexadecimal: 00:07:00 •WANs and Routers: 00:09:00 •Cables and Connectors: 00:11:00 •Crimping Cables: 00:10:00 •Structured Cabling: 00:11:00 •Introduction to TCP/IP: 00:14:00 •Network IDs and Subnet Masks: 00:05:00 •Special IP Addresses: 00:09:00 •NAT: 00:07:00 •Dynamic IP Addressing: 00:10:00 •IPv6: 00:07:00 •Port Numbers: 00:12:00 •TCP, UDP, and ICMP: 00:06:00 •Understanding DNS: 00:09:00 •Working with DNS: 00:07:00 •Windows Naming: 00:08:00 •Routers: 00:12:00 •Basic Router Configuration: 00:12:00 •Advanced Router Configuration: 00:06:00 •VLANs: 00:07:00 •Network Troubleshooting: 00:05:00 •Wireless Network Hardware: 00:11:00 •Wi-Fi Standards: 00:10:00 •Basic WAP Setup: 00:11:00 •Connecting to a Wi-Fi Network: 00:09:00 •It's a Huge Mesh: 00:04:00 •Beyond Wi-Fi: 00:07:00 •Troubleshooting Wireless Connections: 00:07:00 •Beyond the LAN: 00:03:00 •Internet Tiers: 00:06:00 •Dial-up Connections: 00:08:00 •Broadband Connections: 00:10:00 •Firewalls and Servers: 00:06:00 •FTP: 00:07:00 •E-Mail: 00:08:00 •Proxy Servers: 00:06:00 •Virtual Private Networks (VPNs): 00:08:00 •Internet of Things (IoT): 00:04:00 •Understanding Virtualization: 00:10:00 •Your First Virtual Machine: 00:11:00 •Advanced Virtualization Setup: 00:10:00 •Cloud Computing: 00:08:00 •Cloud Ownership: 00:03:00 •Cloud-Based Applications: 00:06:00 •Laptop Features: 00:08:00 •Laptop Hardware Troubleshooting - The Tools: 00:05:00 •Laptop Hardware - Core Hardware: 00:04:00 •Laptop Hardware - CPU and Motherboard: 00:07:00 •Touring Your Laptop Display: 00:04:00 •What is a Mobile Device?: 00:09:00 •Mobile Connections: 00:10:00 •Touring Android: 00:10:00 •Touring iOS: 00:08:00 •Virtual Reality: 00:03:00 •Maintaining Mobile Devices: 00:11:00 •Mobile Devices and E-mail: 00:10:00 •Mobile Synchronization: 00:08:00 •Laser Printers: 00:13:00 •Inkjet Printers: 00:08:00 •Impact Printers: 00:04:00 •Thermal Printers: 00:04:00 •Installing a Local Printer: 00:14:00 •Sharing Printers: 00:08:00 •Installing Wireless and Cloud Printers: 00:10:00 •Troubleshooting Printers: 00:10:00 •3D Printing: 00:07:00 •Dealing with Threats: 00:07:00 •Assignment - CompTIA A+ (220-1001): 00:00:00

CompTIA A+ (220-1001)
Delivered Online On Demand17 hours 30 minutes
£12

Fitness Business - Sell Products, Training & Coaching Online

4.9(27)

By Apex Learning

Overview This comprehensive course on Fitness Business - Sell Products, Training & Coaching Online will deepen your understanding on this topic.After successful completion of this course you can acquire the required skills in this sector. This Fitness Business - Sell Products, Training & Coaching Online comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this Fitness Business - Sell Products, Training & Coaching Online. It is available to all students, of all academic backgrounds. Requirements Our Fitness Business - Sell Products, Training & Coaching Online is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G.There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 9 sections • 44 lectures • 03:08:00 total length •Who this course is for: 00:02:00 •What you will learn: 00:03:00 •Fitness Business Models Overview: 00:02:00 •The Coaching Business Model: 00:04:00 •Selling Products Business Model: 00:06:00 •Affiliate Marketing Business Model: 00:06:00 •Fitness Sponsorships: 00:02:00 •The First Steps: 00:03:00 •Finding The Right Fitness Niche: 00:04:00 •How To Identify The Ideal Coaching Client: 00:05:00 •How To Identify Your Clients Pain Points: 00:03:00 •How To Become An Expert: 00:04:00 •Understand What You Are Selling: 00:01:00 •Creating Your First Fitness Information Product: 00:07:00 •MVP - Minimal Viable Product: 00:03:00 •Creating Your First Workout Routine / Diet Plan: 00:04:00 •Writing Your First Fitness eBook: 00:06:00 •Recording Your First Fitness Video Course: 00:06:00 •Creating A Coaching Offer: 00:03:00 •Overview: 00:02:00 •Most Common Fitness Marketing Mistakes: 00:04:00 •Setting SMART Marketing Goals: 00:07:00 •Crafting A Stong Marketing Message: 00:06:00 •Choosing The Right Marketing Channel: 00:08:00 •Email Marketing For Your Product: 00:03:00 •How To Build An Email List: 00:03:00 •Your First Autoresponder Series: 00:10:00 •How To Build The Perfect Lead Magnet: 00:05:00 •How To Use WordPress For Your Fitness Business: 00:08:00 •Installing WordPress: 00:05:00 •Building A Landing Page: 00:06:00 •Building A Thank You Page: 00:03:00 •Starting A Niche Youtube Channel: 00:05:00 •Keyword Research For Youtube: 00:04:00 •My Youtube Content Strategy: 00:04:00 •How To Set Up Your First Lead Ad In Facebook: 00:06:00 •Affiliate Marketing Overview: 00:01:00 •Writing Blog Posts With Affiliate Links: 00:04:00 •Making Affiliate Sales With Youtube Videos: 00:03:00 •Motivation Intro: 00:01:00 •How To Deal With Difficult Customers / Clients: 00:03:00 •How To Deal With Email Overload: 00:04:00 •How To Develop The Mindset Of An Entrepreneur: 00:04:00 •How To Not Lose Track Of Your Business Goals: 00:05:00

Fitness Business - Sell Products, Training & Coaching Online
Delivered Online On Demand3 hours 8 minutes
£12

Complete Machine Learning & Data Science Bootcamp 2023

4.9(27)

By Apex Learning

Overview In this age of technology, data science and machine learning skills have become highly demanding skill sets. In the UK a skilled data scientist can earn around £62,000 per year. If you are aspiring for a career in the IT industry, secure these skills before you start your journey. The Complete Machine Learning & Data Science Bootcamp 2023 course can help you out. This course will introduce you to the essentials of Python. From the highly informative modules, you will learn about NumPy, Pandas and matplotlib. The course will help you grasp the skills required for using python for data analysis and visualisation. After that, you will receive step-by-step guidance on Python for machine learning. The course will then focus on the concepts of Natural Language Processing.  Upon successful completion of the course, you will receive a certificate of achievement. This certificate will help you elevate your resume. So enrol today! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? Anyone with an interest in learning about data science can enrol in this course. It will help aspiring professionals develop the basic skills to build a promising career. Professionals already working in this can take the course to improve their skill sets. Requirements The students will not require any formal qualifications or previous experience to enrol in this course. Anyone can learn from the course anytime from anywhere through smart devices like laptops, tabs, PC, and smartphones with stable internet connections. They can complete the course according to their preferable pace so, there is no need to rush.   Career Path This course will equip you with valuable knowledge and effective skills in this area. After completing the course, you will be able to explore career opportunities in the fields such as Data Analyst Data Scientist Data Manager Business Analyst Course Curriculum 18 sections • 98 lectures • 23:48:00 total length •Welcome & Course Overview6: 00:07:00 •Set-up the Environment for the Course (lecture 1): 00:09:00 •Set-up the Environment for the Course (lecture 2): 00:25:00 •Two other options to setup environment: 00:04:00 •Python data types Part 1: 00:21:00 •Python Data Types Part 2: 00:15:00 •Loops, List Comprehension, Functions, Lambda Expression, Map and Filter (Part 1): 00:16:00 •Loops, List Comprehension, Functions, Lambda Expression, Map and Filter (Part 2): 00:20:00 •Python Essentials Exercises Overview: 00:02:00 •Python Essentials Exercises Solutions: 00:22:00 •What is Numpy? A brief introduction and installation instructions.: 00:03:00 •NumPy Essentials - NumPy arrays, built-in methods, array methods and attributes.: 00:28:00 •NumPy Essentials - Indexing, slicing, broadcasting & boolean masking: 00:26:00 •NumPy Essentials - Arithmetic Operations & Universal Functions: 00:07:00 •NumPy Essentials Exercises Overview: 00:02:00 •NumPy Essentials Exercises Solutions: 00:25:00 •What is pandas? A brief introduction and installation instructions.: 00:02:00 •Pandas Introduction: 00:02:00 •Pandas Essentials - Pandas Data Structures - Series: 00:20:00 •Pandas Essentials - Pandas Data Structures - DataFrame: 00:30:00 •Pandas Essentials - Handling Missing Data: 00:12:00 •Pandas Essentials - Data Wrangling - Combining, merging, joining: 00:20:00 •Pandas Essentials - Groupby: 00:10:00 •Pandas Essentials - Useful Methods and Operations: 00:26:00 •Pandas Essentials - Project 1 (Overview) Customer Purchases Data: 00:08:00 •Pandas Essentials - Project 1 (Solutions) Customer Purchases Data: 00:31:00 •Pandas Essentials - Project 2 (Overview) Chicago Payroll Data: 00:04:00 •Pandas Essentials - Project 2 (Solutions Part 1) Chicago Payroll Data: 00:18:00 •Matplotlib Essentials (Part 1) - Basic Plotting & Object Oriented Approach: 00:13:00 •Matplotlib Essentials (Part 2) - Basic Plotting & Object Oriented Approach: 00:22:00 •Matplotlib Essentials (Part 3) - Basic Plotting & Object Oriented Approach: 00:22:00 •Matplotlib Essentials - Exercises Overview: 00:06:00 •Matplotlib Essentials - Exercises Solutions: 00:21:00 •Seaborn - Introduction & Installation: 00:04:00 •Seaborn - Distribution Plots: 00:25:00 •Seaborn - Categorical Plots (Part 1): 00:21:00 •Seaborn - Categorical Plots (Part 2): 00:16:00 •Seborn-Axis Grids: 00:25:00 •Seaborn - Matrix Plots: 00:13:00 •Seaborn - Regression Plots: 00:11:00 •Seaborn - Controlling Figure Aesthetics: 00:10:00 •Seaborn - Exercises Overview: 00:04:00 •Seaborn - Exercise Solutions: 00:19:00 •Pandas Built-in Data Visualization: 00:34:00 •Pandas Data Visualization Exercises Overview: 00:03:00 •Panda Data Visualization Exercises Solutions: 00:13:00 •Plotly & Cufflinks - Interactive & Geographical Plotting (Part 1): 00:19:00 •Plotly & Cufflinks - Interactive & Geographical Plotting (Part 2): 00:14:00 •Plotly & Cufflinks - Interactive & Geographical Plotting Exercises (Overview): 00:11:00 •Plotly & Cufflinks - Interactive & Geographical Plotting Exercises (Solutions): 00:17:00 •Project 1 - Oil vs Banks Stock Price during recession (Overview): 00:15:00 •Project 1 - Oil vs Banks Stock Price during recession (Solutions Part 1): 00:18:00 •Project 1 - Oil vs Banks Stock Price during recession (Solutions Part 2): 00:18:00 •Project 1 - Oil vs Banks Stock Price during recession (Solutions Part 3): 00:17:00 •Project 2 (Optional) - Emergency Calls from Montgomery County, PA (Overview): 00:03:00 •Introduction to ML - What, Why and Types..: 00:15:00 •Theory Lecture on Linear Regression Model, No Free Lunch, Bias Variance Tradeoff: 00:15:00 •scikit-learn - Linear Regression Model - Hands-on (Part 1): 00:17:00 •scikit-learn - Linear Regression Model Hands-on (Part 2): 00:19:00 •Good to know! How to save and load your trained Machine Learning Model!: 00:01:00 •scikit-learn - Linear Regression Model (Insurance Data Project Overview): 00:08:00 •scikit-learn - Linear Regression Model (Insurance Data Project Solutions): 00:30:00 •Theory: Logistic Regression, conf. mat., TP, TN, Accuracy, Specificityetc.: 00:10:00 •scikit-learn - Logistic Regression Model - Hands-on (Part 1): 00:17:00 •scikit-learn - Logistic Regression Model - Hands-on (Part 2): 00:20:00 •scikit-learn - Logistic Regression Model - Hands-on (Part 3): 00:11:00 •scikit-learn - Logistic Regression Model - Hands-on (Project Overview): 00:05:00 •scikit-learn - Logistic Regression Model - Hands-on (Project Solutions): 00:15:00 •Theory: K Nearest Neighbors, Curse of dimensionality .: 00:08:00 •scikit-learn - K Nearest Neighbors - Hands-on: 00:25:00 •scikt-learn - K Nearest Neighbors (Project Overview): 00:04:00 •scikit-learn - K Nearest Neighbors (Project Solutions): 00:14:00 •Theory: D-Tree & Random Forests, splitting, Entropy, IG, Bootstrap, Bagging.: 00:18:00 •scikit-learn - Decision Tree and Random Forests - Hands-on (Part 1): 00:19:00 •scikit-learn - Decision Tree and Random Forests (Project Overview): 00:05:00 •scikit-learn - Decision Tree and Random Forests (Project Solutions): 00:15:00 •Support Vector Machines (SVMs) - (Theory Lecture): 00:07:00 •scikit-learn - Support Vector Machines - Hands-on (SVMs): 00:30:00 •scikit-learn - Support Vector Machines (Project 1 Overview): 00:07:00 •scikit-learn - Support Vector Machines (Project 1 Solutions): 00:20:00 •scikit-learn - Support Vector Machines (Optional Project 2 - Overview): 00:02:00 •Theory: K Means Clustering, Elbow method.: 00:11:00 •scikit-learn - K Means Clustering - Hands-on: 00:23:00 •scikit-learn - K Means Clustering (Project Overview): 00:07:00 •scikit-learn - K Means Clustering (Project Solutions): 00:22:00 •Theory: Principal Component Analysis (PCA): 00:09:00 •scikit-learn - Principal Component Analysis (PCA) - Hands-on: 00:22:00 •scikit-learn - Principal Component Analysis (PCA) - (Project Overview): 00:02:00 •scikit-learn - Principal Component Analysis (PCA) - (Project Solutions): 00:17:00 •Theory: Recommender Systems their Types and Importance: 00:06:00 •Python for Recommender Systems - Hands-on (Part 1): 00:18:00 •Python for Recommender Systems - - Hands-on (Part 2): 00:19:00 •Natural Language Processing (NLP) - (Theory Lecture): 00:13:00 •NLTK - NLP-Challenges, Data Sources, Data Processing ..: 00:13:00 •NLTK - Feature Engineering and Text Preprocessing in Natural Language Processing: 00:19:00 •NLTK - NLP - Tokenization, Text Normalization, Vectorization, BoW.: 00:19:00 •NLTK - BoW, TF-IDF, Machine Learning, Training & Evaluation, Naive Bayes : 00:13:00 •NLTK - NLP - Pipeline feature to assemble several steps for cross-validation: 00:09:00

Complete Machine Learning & Data Science Bootcamp 2023
Delivered Online On Demand23 hours 48 minutes
£12

ITIL Practitioner

4.9(27)

By Apex Learning

Overview This comprehensive course on ITIL Practitioner will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This ITIL Practitioner comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this ITIL Practitioner. It is available to all students, of all academic backgrounds. Requirements Our ITIL Practitioner is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 9 sections • 52 lectures • 07:37:00 total length •Course Introduction!: 00:14:00 •Learning Objectives: 00:06:00 •Selecting a Management System: 00:11:00 •Systems Thinking: 00:13:00 •The 4Ps: 00:14:00 •Communication & Management Systems: 00:14:00 •Organizational Capabilities: 00:10:00 •Adopt, Adapt & Realize: 00:15:00 •Outside-in vs Inside-out Thinking: 00:11:00 •Defining a Service: 00:05:00 •Metrics & Measurement: 00:07:00 •Improvement, the Practitioner & CSI: 00:10:00 •Driving IT Service Management Summary: 00:15:00 •Checkpoint: 00:16:00 •Learning Objectives: 00:04:00 •Principles: 00:24:00 •Themes: 00:09:00 •Principles & Themes in Practice: 00:08:00 •Principles & Themes Summary: 00:03:00 •Checkpoint: 00:07:00 •Learning Objectives: 00:02:00 •Role & Impact of OCM on Improvement: 00:07:00 •OCM Activities: 00:16:00 •OCM & Systems Thinking: 00:06:00 •OCM Summary: 00:05:00 •Checkpoint: 00:10:00 •Learning Objectives: 00:01:00 •Value, Importance & Benefit of Good Communication: 00:05:00 •Principles of Communication: 00:11:00 •Role of Influence: 00:07:00 •Communication Summary: 00:05:00 •Checkpoint: 00:09:00 •Learning Objectives: 00:02:00 •CSFs, KPIs & Improvement: 00:18:00 •Analyze CSFs & KPIs in Context: 00:09:00 •Assessments: 00:04:00 •Use Metrics & Measurement Summary: 00:05:00 •Design a Report: 00:07:00 •Checkpoint: 00:08:00 •Learning Objectives: 00:02:00 •It Depends: 00:09:00 •Approach Deconstructed: 00:25:00 •Goal Question Metric (GQM) Approach Introduction: 00:08:00 •CSI Approach Summary: 00:05:00 •Checkpoint: 00:07:00 •Learning Objectives: 00:01:00 •CSI Approach for the ITIL Practitioner: 00:07:00 •CSI Approach in ITIL: 00:25:00 •CSI Approach, PRINCE2 & RESILIA: 00:06:00 •Integrating CSI with ITIL & Beyond Summary: 00:03:00 •Checkpoint: 00:06:00 •Workbooks - ITIL Practitioner - Video Training Course: 00:00:00

ITIL Practitioner
Delivered Online On Demand7 hours 37 minutes
£12

Business Strategy Planning

4.9(27)

By Apex Learning

Overview This comprehensive course on Business Strategy Planning will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Business Strategy Planning comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Business Strategy Planning. It is available to all students, of all academic backgrounds. Requirements Our Business Strategy Planning is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 24 sections • 163 lectures • 14:21:00 total length •Learn Business Fundamentals and Create Your Own Business Plan Today!: 00:02:00 •Quickfire Strategy Quiz How much do you know about your business strategy?: 00:02:00 •Quickfire Strategy Quiz - My 'Answers': 00:10:00 •How to get the most from this Course: 00:09:00 •Using the Course Map Matrix: 00:06:00 •Guide to the Course Assignments: 00:04:00 •Download All Course Materials Here: 00:03:00 •Section Introduction: Connecting Business Strategy to the Business Plan: 00:02:00 •Business Strategy to Business Plan: 00:04:00 •What do we mean by Business Strategy?: 00:02:00 •What is a Business Plan?: 00:06:00 •What do we mean by Corporate Strategy?: 00:07:00 •Should You Be Creating Shareholder Value?: 00:07:00 •Introduction to Strategic Management: 00:06:00 •Section Introduction: The Value of Strategic Analysis: 00:01:00 •Strategic Analysis - The First Step: 00:02:00 •What is Strategic Analysis?: 00:05:00 •Frameworks for Strategic Analysis: 00:10:00 •Strategic Analysis Frameworks Case Study: Apple: 00:11:00 •Section Introduction: Frameworks and Theories Business Strategists Must Know: 00:02:00 •Why are these Business Models important?: 00:02:00 •The Story of the Hedgehog and the Fox: 00:03:00 •Why are Management Theories Useful in Business Strategy?: 00:09:00 •SWOT Analysis: 00:05:00 •Introduction to Michael Porter's Five Forces Model: 00:06:00 •Lafley and Martin Five Step Strategy Model: 00:06:00 •The 5Cs Model: 00:06:00 •What is PEST or Broad Factors Analysis?: 00:05:00 •PESTEL Analysis: 00:05:00 •Ansoff Matrix: 00:07:00 •Value Chain: 00:05:00 •Business Model Synthesis: 00:08:00 •Black Swan Events - Coronavirus: 00:05:00 •Section Introduction: Critical Evaluation of Leadership: 00:01:00 •Vision and Leadership - Starting at the Top: 00:06:00 •What Skills Are We Looking For In Management?: 00:07:00 •What is the Purpose of a Vision Statement?: 00:03:00 •Section Introduction: Products Services and Competitive Advantage: 00:02:00 •What do we mean by Products and Services: 00:03:00 •Why Product Differentiation is Critical: 00:05:00 •Product Diversification in Business Strategy: 00:06:00 •How Does Quality Management fit into your Business Strategy?: 00:04:00 •What do we mean by Competitive Advantage?: 00:06:00 •Bowman's Strategic Clock - Strategic Positioning: 00:09:00 •Products, Services and Technology in the Business Plan: 00:06:00 •Section Introduction: Competition - Know Your Enemy: 00:02:00 •Competitor Analysis: 00:05:00 •BCG Matrix: 00:06:00 •Competitors and Competitive Forces: 00:10:00 •Competitive Intensity: 00:09:00 •Industry Life Cycle: 00:05:00 •Competition - Business Plan Tie In: 00:02:00 •Section Introduction: Industry, Markets and Competition: 00:02:00 •What do we mean by External Strategic Analysis: 00:09:00 •How Does Industry Analysis Help?: 00:05:00 •Conducting PEST or Broad Factors External Analysis: 00:11:00 •What are the Business and Funding Life Cycles?: 00:10:00 •Value Chains: Connecting Companies to their External Environment: 00:08:00 •Addressing the Total Addressable Market (TAM): 00:05:00 •Market Segmentation: Choosing Customers: 00:07:00 •Bargaining Power of Suppliers: 00:06:00 •Bargaining Power of Customers/Buyers: 00:06:00 •Business Plan: Industry, Markets and Competition: 00:04:00 •Section Introduction - Operations and Customer Management: 00:02:00 •What are Business Operations?: 00:03:00 •Strategic Analysis with the Business Model Canvas: 00:14:00 •How can Corporate Structure impact Strategy?: 00:07:00 •Organisational Development: 00:04:00 •Reviewing the Operations of the Firm: 00:03:00 •Click and Mortar - Online meets Offline: 00:05:00 •eCommerce Business Models: 00:06:00 •Internal Strategic Analysis - Business Plan Tie In: 00:05:00 •Section Introduction: Six Minute Strategist SWOT Assignment: 00:02:00 •Section Introduction: Customer Value Proposition: 00:02:00 •Understanding the Customer Value Proposition: 00:03:00 •Positioning Your Firm in the Market: 00:04:00 •What do we mean by a Profit Model?: 00:05:00 •Hax's Delta Model: 00:09:00 •Switching Costs and Customer Strategy: 00:03:00 •Managing the Customer Experience: 00:05:00 •What is the Customer Journey?: 00:06:00 •Customers, Customer Value and the Business Plan: 00:03:00 •Section Introduction: Sales and Marketing: 00:02:00 •The 5 Ps of Marketing: 00:06:00 •How Can You Plan Your Marketing?: 00:11:00 •Push Marketing Strategy: 00:03:00 •Pull Marketing Strategy: 00:04:00 •Understanding AIDA: 00:07:00 •Progressive Sequence of 9 Agreements: 00:07:00 •Pricing Strategies: 00:11:00 •Sales and Marketing in the Business Plan: 00:06:00 •Section Introduction: Digital Business Strategy Transformation: 00:02:00 •Why Do You Need A Digital Strategy Blueprint?: 00:07:00 •What Skills and Assets do you need to be a Digital Entrepreneur?: 00:07:00 •Digital Strategy Blueprint Overview: 00:18:00 •Digital Strategy - Customer Centric Transformation: 00:07:00 •Digital Strategy - Customer Experience Transformation: 00:05:00 •Digital Strategy - Customer Channel Transformation: 00:06:00 •Digital Strategy - Customer Engagement Transformation: 00:19:00 •Digital Strategy - Digital Skills Transformation: 00:04:00 •Digital Strategy - Tools and Resources: 00:02:00 •Section Introduction: Understanding Financial Statements: 00:02:00 •Overview of Financial Statements: 00:03:00 •GAAP: Accruals vs Cash Accounting: 00:06:00 •Income Statement or Profit and Loss Account: 00:08:00 •Introduction to the Balance Sheet: 00:11:00 •Cash Flow Statement: 00:06:00 •Cash Flow Metrics Explained: 00:09:00 •Case Study - Apple Financial Statements: 00:04:00 •Financial Statements in the Business Plan: 00:06:00 •Section Introduction: Strategic Financial Analysis: 00:01:00 •What is Financial Analysis?: 00:11:00 •Income Statement Profitability Ratios: 00:04:00 •Balance Sheet Ratio Analysis: 00:12:00 •Cash Flow Statement Analysis: 00:05:00 •Valuation Ratios: 00:04:00 •Section Introduction: Financial Analysis - Case Study and Assignment: 00:01:00 •Apple Inc Financial Analysis - Solution: 00:03:00 •Discussion of Measurements of Growth Analysis: 00:05:00 •Discussion of Measures of Profitability Analysis: 00:07:00 •Discussion of Trading Performance Analysis: 00:03:00 •Discussion of Working Capital (Liquidity and Efficiency) Analysis: 00:12:00 •Section Introduction: Future Business Strategy Analyser Assignment: 00:01:00 •Section Introduction: Goal Setting and Performance Management: 00:02:00 •Introduction to Goal Setting: 00:03:00 •What do we mean by SMART Goals?: 00:04:00 •Key Performance Indicators: 00:04:00 •Strategic Dashboards: 00:07:00 •Corporate Performance Management: 00:04:00 •Objectives and Key Results: 00:04:00 •Year over Year Performance: 00:04:00 •Section Introduction: Growth Strategies: 00:02:00 •Organic vs Inorganic: 00:03:00 •The Advantage of First Mover Advantage: 00:05:00 •The Importance of Scalability: 00:04:00 •Merger and Acquisitions Growth Strategies: 00:10:00 •Buy and Build Growth Strategy: 00:08:00 •Negative Growth- Company Recovery Strategies: 00:09:00 •Post Coronavirus Strategies: 00:06:00 •Growth Strategies Business Plan Tie In: 00:03:00 •Section Introduction: Valuation, Funding, Exits and Returns: 00:02:00 •Valuation and Funding - A Consequence of our Business Strategy: 00:04:00 •How to Value a Company: 00:11:00 •Sources of Equity Funding: 00:08:00 •What is a Pre-Money Valuation?: 00:06:00 •How to Create a Pitch Deck for Investors: 00:06:00 •Sources and Uses of Funds in the Business Plan: 00:02:00 •What is a Cap Table?: 00:05:00 •Exit Strategies and Returns: 00:09:00 •Transaction Cost Management: 00:02:00 •Section Introduction: Risk Assessment: 00:01:00 •Risk Assessment - Strategic Plan Summary: 00:02:00 •Section Introduction: Business Plan Synthesis: 00:03:00 •Business Plan Synthesis: 00:03:00 •Business Plan - Executive Summary: 00:02:00 •Business Plan - History and Background: 00:02:00 •Business Plan - Management Summary: 00:04:00 •Business Plan Appendicies: 00:04:00 •Key Questions Check List: 00:01:00 •Business Plan - Audience Targeting: 00:03:00 •Business Plan Refinement: Types of Businesses: 00:02:00 •Summary and Wrap Up: 00:05:00 •Additional File: 00:00:00

Business Strategy Planning
Delivered Online On Demand14 hours 21 minutes
£12

VMware vSAN: Install, Configure, Manage [V8]

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture™ concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences

VMware vSAN: Install, Configure, Manage [V8]
Delivered OnlineFlexible Dates
Price on Enquiry