• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26224 Courses in Liverpool delivered Online

Nursery Assistant and Child Attachment

By NextGen Learning

Nursery Assistant and Child Attachment Course Overview This course is designed to provide learners with a comprehensive understanding of the role of a Nursery Assistant and the critical aspects of child attachment. Covering key areas such as child development, attachment theory, and child psychology, the course equips learners with the knowledge required to support children effectively in their early years. Learners will explore the importance of early childhood development and how attachment plays a pivotal role in shaping children's emotional well-being. By the end of the course, learners will be prepared to work in environments where nurturing and safeguarding children's development are essential. Course Description This course delves into the fundamental principles of child development, attachment theory, and child psychology. Learners will examine how attachment influences children's emotional and social growth, with an emphasis on recognising signs of attachment disorders. The course also covers topics like the importance of early years development, child protection, and keeping children safe and healthy. Through an engaging learning experience, participants will gain a deep understanding of the role of nursery assistants in supporting children's overall development. The course ensures learners are well-equipped to handle sensitive situations in childcare settings, providing a solid foundation for those pursuing careers in early years education and child development. Nursery Assistant and Child Attachment Curriculum Module 01: Introduction to Nursery Assistance Module 02: Understanding Child Development Module 03: Importance of Early Years Development Module 04: Introduction to Child Attachment Module 05: Introduction to Child Psychology Module 06: Fundamentals of Attachment Theory Module 07: Assessments of Attachment Module 08: Attachment Disorder Module 09: Care for Children Module 10: Keeping Children Healthy and Safe Module 11: Child Protection (See full curriculum) Who is this course for? Individuals seeking to support children's emotional and psychological development. Professionals aiming to enhance their knowledge in early childhood care. Beginners with an interest in child development and psychology. Those pursuing a career in nursery or childcare settings. Career Path Nursery Assistant Early Years Educator Childcare Worker Child Protection Officer Teaching Assistant in Early Years Education Social Worker specialising in Child Development

Nursery Assistant and Child Attachment
Delivered OnlineFlexible Dates
£7.99

Symmetrical Components for Three Phase Power Analysis

By NextGen Learning

Symmetrical Components for Three Phase Power Analysis Course Overview This course on Symmetrical Components for Three Phase Power Analysis provides a comprehensive introduction to a fundamental technique used in electrical power engineering. Learners will explore how symmetrical components simplify the analysis of unbalanced three-phase power systems, enhancing their ability to diagnose and solve complex electrical faults. The course offers clear explanations of key concepts such as positive, negative, and zero sequence components, as well as the mathematical tools required to apply them effectively. By completing this course, participants will gain valuable skills that improve their understanding of power system behaviour, enabling more accurate system design, fault analysis, and operational decision-making. This knowledge is essential for engineers, technicians, and students engaged in power system analysis and maintenance. Course Description This detailed course delves into the principles and applications of symmetrical components within three-phase power systems. Starting with an introduction to the historical background and theoretical framework, learners will examine the mathematical derivation and significance of symmetrical components. Key topics include the definition and roles of the positive, negative, and zero sequence components, the “a” operator used in transformations, and the synthesis equations that enable conversion between phase and sequence quantities. The course also emphasises problem-solving techniques through a variety of illustrative examples, fostering a thorough understanding of how symmetrical components aid in analysing unbalanced loads and fault conditions. Learners will develop the ability to interpret and manage three-phase system data with greater precision, a crucial skill for careers in electrical engineering and power system operation. Symmetrical Components for Three Phase Power Analysis Curriculum: Module 01: Introduction Module 02: Symmetrical Components Overview Module 03: The Components Module 04: The “a” Operator Module 05: Working with the a Operator Module 06: Synthesis Equations Module 07: Problems & Solutions (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of three-phase power systems. Professionals aiming to advance their expertise in electrical power engineering. Beginners with an interest in electrical engineering and power system analysis. Engineering students preparing for careers in power distribution and fault analysis. Career Path Electrical Power Engineer Power System Analyst Electrical Design Engineer Maintenance Engineer in Power Utilities Technical Specialist in Energy Sector

Symmetrical Components for Three Phase Power Analysis
Delivered OnlineFlexible Dates
£7.99

Computer Science With Python

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Science With Python will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Science With Python comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Science With Python. It is available to all students, of all academic backgrounds. Requirements Our Computer Science With Python is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 152 lectures • 04:54:00 total length •Introduction: 00:03:00 •Quiz 1: 00:02:00 •Quiz 1 Solution: 00:01:00 •What is Programming: 00:03:00 •Quiz 2: 00:01:00 •Quiz 2 Solution: 00:01:00 •Meeting the interpreter and Problem Quiz 3: 00:01:00 •Quiz 3 solution: 00:01:00 •Congratulations: 00:01:00 •Why programming and Quiz 4: 00:02:00 •Quiz 4 Solution: 00:03:00 •Grammar and Python Rules: 00:04:00 •Backus Naur Form: 00:03:00 •Quiz 4 part 2: 00:01:00 •Quiz 4 part 2 Solution: 00:01:00 •Python Grammar and Quiz 5: 00:05:00 •Quiz 5 Solution: 00:03:00 •Quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Processors: 00:02:00 •Introducing Variables: 00:05:00 •Variables Quiz 7: 00:02:00 •Variables Can Vary: 00:03:00 •Variables Quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Variables Quiz 9: 00:01:00 •Quiz 9 Solution: 00:01:00 •Variables Quiz 10: 00:01:00 •Quiz 10 Solution: 00:03:00 •Introducing Strings: 00:04:00 •Using Strings Quiz 11: 00:01:00 •Quiz 11 Solution: 00:03:00 •Strings and Numbers - String Concatenation Quiz Solution: 00:03:00 •String indexing: 00:02:00 •Quiz 13: 00:01:00 •Quiz 13 Solution: 00:03:00 •String subsequences: 00:04:00 •String subsequences quiz 14: 00:01:00 •Quiz 14 solution: 00:02:00 •Understanding selection quiz 15: 00:01:00 •Quiz 15 solution: 00:04:00 •Finding string in string quiz 16: 00:04:00 •Quiz 16 solution: 00:02:00 •Testing and quiz 17: 00:02:00 •Quiz 17 solution: 00:03:00 •Find With Parameter Quiz 18: 00:02:00 •Quiz 18 solution: 00:01:00 •Extracting links from a web page Quiz 19: 00:03:00 •Extracting links from a web page Quiz 19 Solution: 00:02:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Congratulations: 00:01:00 •Unit Overview: 00:03:00 •Procedural Abstraction: 00:03:00 •Introducing Procedures: 00:04:00 •Procedure code quiz 1: 00:04:00 •Quiz 1 Solution: 00:01:00 •Output and quiz 2: 00:01:00 •Quiz 2 Solution: 00:02:00 •Return Statement and Quiz 3: 00:03:00 •Quiz 3 solution: 00:02:00 •Inc Procedure Quiz 4: 00:01:00 •Quiz 4 Solution: 00:01:00 •Sum Procedure and Quiz 5: 00:01:00 •Quiz 5 Solution: 00:02:00 •Sum procedure with a return statement: 00:02:00 •Square procedure quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Sum 3 Quiz 7: 00:01:00 •Quiz 7 Solution: 00:02:00 •Double string procedure quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Find second quiz 9: 00:02:00 •Quiz 9 Solution: 00:02:00 •Equality Comparison Quiz 10: 00:04:00 •Quiz 10 Solution: 00:01:00 •If statement quiz 11: 00:03:00 •Quiz 11 Solution: 00:03:00 •Is friend quiz 12: 00:02:00 •Quiz 12 solution: 00:02:00 •Is friend quiz 13: 00:02:00 •Quiz 13 Solution: 00:02:00 •The Or construct: 00:03:00 •Quiz 14 solution: 00:06:00 •While loop quiz 15: 00:05:00 •Quiz 15 solution: 00:03:00 •While loop quiz 16: 00:01:00 •Quiz 16 solution: 00:02:00 •Print numbers quiz 17: 00:01:00 •Quiz 17 solution: 00:02:00 •Factorial quiz 18: 00:02:00 •Quiz 18 solution: 00:02:00 •Break quiz 19: 00:04:00 •Quiz 19 solution: 00:03:00 •Quiz 20: 00:05:00 •Quiz 20 Solution: 00:01:00 •No links quiz 21: 00:01:00 •Print all links quiz 21 solution: 00:03:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Unit Overview: 00:03:00 •Stooges and quiz 1: 00:01:00 •Quiz 1 Solution: 00:01:00 •Countries quiz: 00:01:00 •Quiz 3 solution: 00:01:00 •Relative Size Quiz: 00:01:00 •Quiz 4 Solution: 00:01:00 •Lists Mutation: 00:01:00 •Different Stooges quiz: 00:01:00 •Quiz 5 Solution: 00:01:00 •Secret Agent Man Quiz: 00:01:00 •Replace Spy Quiz: 00:01:00 •Quiz 7 Solution: 00:03:00 •Python List Addition and Length: 00:02:00 •List Operations In Python: 00:02:00 •Python lists length quiz: 00:01:00 •Quiz 8 Solution: 00:01:00 •Append Quiz: 00:01:00 •Hard drive quiz: 00:01:00 •Quiz 11 Solution: 00:01:00 •Python Loops on Lists Quiz: 00:02:00 •Quiz 12 solution: 00:02:00 •Python For loops: 00:03:00 •Sum List Quiz: 00:01:00 •Measure a String Quiz: 00:01:00 •Find Element Quiz: 00:02:00 •Quiz 15 solution: 00:04:00 •Quiz 16 solution: 00:01:00 •Python Union Procedure Quiz: 00:01:00 •Quiz 17 solution: 00:01:00 •Pop in Python Quiz 18: 00:02:00 •Quiz 18 solution: 00:03:00 •Collecting Links: 00:01:00 •Get All Links: 00:02:00 •Starting Get All Links Quiz: 00:01:00 •Quiz 19 solution: 00:01:00 •Updating Links Quiz: 00:01:00 •Quiz 20 Solution: 00:01:00 •Finishing Get All Links Quiz: 00:01:00 •Quiz 21 Solution: 00:01:00 •Finishing the Python Web Crawler: 00:03:00 •Crawling Process Quiz: 00:01:00 •Quiz 22 Solution: 00:01:00 •Crawl Web Quiz: 00:01:00 •Quiz 23 Solution: 00:01:00 •Crawl Web Loop Quiz: 00:01:00 •Quiz 24 Solution: 00:02:00 •Crawl If Quiz: 00:01:00 •Quiz 25 Solution: 00:01:00 •Finishing Crawl Web and Final Quiz: 00:02:00 •Final Quiz Solution & Conclusion: 00:03:00 •Assignment - Computer Science With Python: 00:00:00

Computer Science With Python
Delivered Online On Demand4 hours 54 minutes
£12

CompTIA Security+ (SY0-601)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

Ethical Hacking with Kali Linux

4.9(27)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Effective Data Visualization with Tableau

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is relevant to anyone who needs to work with and understand data including: Business Analysts, Data Analysts, Reporting and BI professionals Marketing and Digital Marketing professionals Digital, Web, e-Commerce, Social media and Mobile channel professionals Business managers who need to interpret analytical output to inform managerial decisions Overview This course will cover the basic theory of data visualization along with practical skills for creating compelling visualizations, reports and dashboards from data using Tableau. Outcome: After attending this course delegates will understand - How to move from business questions to great data visualizations and beyond How to apply the fundamentals of data visualization to create informative charts How to choose the right visualization type for the job at hand How to design and develop basic dashboards in Tableau that people will love to use by doing the following: Reading data sources into Tableau Setting up the roles and data types for your analysis Creating new data fields using a range of calculation types Creating the following types of charts - cross tabs, pie and bar charts, geographic maps, dual axis and combo charts, heat maps, highlight tables, tree maps and scatter plots Creating Dashboards that delight using the all of the features available in Tableau. The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to tourism. From Business Questions to Data Visualisation and Beyond The first step in any data analysis project is to move from a business question to data analysis and then on to a complete solution. This section will examine this conversion emphasizing: The use of data visualization to address a business need The data analytics process ? from business questions to developed dashboards Introduction to Tableau ? Part 1 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Introduction to Tableau ? Part 2 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Key Components of Good Data Visualisation and The Visualisation Zoo In this section the following topics will be covered: Colour theory Graphical perception & communication Choosing the right chart for the right job Data Exploration with Tableau Exploring data to answer business questions is one of the key uses of applying good data visualization techniques within Tableau. In this section we will apply the data visualization theory from the previous section within Tableau to uncover trends within the data to answer specific business questions. The types of charts that will be covered are: Cross Tabs Pie and bar charts Geographic maps Dual axis and combo charts with different mark types Heat maps Highlight tables Tree maps Scatter plots Introduction to Building Dashboards with Tableau In this section, we will implement the full process from business question to final basic dashboard in Tableau: Introduction to good dashboard design Building dashboards in Tableau

Effective Data Visualization with Tableau
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c Administration II

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to perform many of the day-to-day administration tasks required of an Oracle database administrator. This course introduces many of the powerful capabilities of the Oracle database. In this course, students will learn about day-to-day administration tasks. It will also address administration sub-specialties. Introduction: Managing the Database Instance The Database Management Tools EM Database Express EM Cloud Control SQL Developer Database Administrator Introduction: Database Architecture Review Database Instance Configurations Memory Structures Process Structures Storage Architecture Introduction: Starting & Stopping Databse Services Start & Stop the Database Listener ABOUT DATABASE STARTUP/SHUTDOWN SYSOPER SYSDBA DATABASE STATE & STAGES STARTUP WITH EM CLOUD CONTROL STARTUP WITH SQL*PLUS SHUTDOWN WITH EM CLOUD CONTROL SHUTDOWN WITH SQL*PLUS USING MS WINDOWS SERVICES Introduction: Oracle Network Environment Oracle Net Services Architecture ORACLE NET CONFIGURATION ASSISTANT ORACLE NET MANAGER USING EM CLOUD CONTROL ADVANCED NETWORK COMPRESSION TROUBLESHOOTING NETWORK PROBLEMS Introduction: Diagnostics & Oracle Support About Database Diagnostics Fault Diagnosability Infrastructure DATABASE INSTANCE HEALTH SNAPSHOT THE SUPPORT WORKBENCH PROACTIVE DATABASE HEALTH CHECKS PACKAGE DIAGNOSTIC DATA WORKING WITH THE KNOWLEDGE BASE Storage: Tablespace Management Starter Tablespaces CREATE TABLESPACE WITH EM CC CREATE TABLESPACE WITH SQL MANAGE TABLESPACES WITH EM CC MANAGE TABLESPACES WITH EM DE MANAGE TABLESPACES WITH SQL DROP TABLESPACE ALTER TABLESPACE Storage: Advanced Tablespace Management Managing Temporary Tablespaces TEMP TABLESPACE GROUPS WITH EM TEMP TABLESPACE GROUPS WITH SQL DEFAULT PERMANENT TABLESPACES BIGFILE TABLESPACES MANAGING THE SYSAUX TABLESPACE Storage: Data Files & Temp Files Management Manage Data Files with EM ACCESS METADATA WITH SQL MANAGE DATA FILES WITH SQL MANAGE TEMP FILES ORACLE-MANAGED FILES (OMF) Storage: UNDO Data & UNDO Tablespaces About UNDO Space Management GUARANTEE UNDO RETENTION MONITOR UNDO SPACE WITH SQL USE THE EM UNDO ADVISOR Security & Schemas: Security Overview & Database Privileges Database Security Principles DATABASE SYSTEM PRIVILEGES DATABASE OBJECT PRIVILEGES SUPER ADMINISTRATOR ROLES PRIVILEGE ANALYSIS Security & Schemas: User Security Create & Manage User Accounts MANAGE USERS WITH EM MANAGE USERS WITH SQL CREATE USER ALTER USER DROP USER GRANT & REVOKE PRIVILEGES RESOURCE LIMITS VIA PROFILES ALTER PROFILE DROP PROFILE PASSWORD MANAGEMENT VIA PROFILES ROLE-BASED SECURITY MANAGEMENT ALTER USER...DEFAULT ROLE SET ROLE DELEGATING PRIVILEGE AUTHORIZATION WITH ADMIN OPTION & System Privileges WITH GRANT OPTION & Object Privileges PRINCIPLE OF LEAST PRIVILEGE CHECKLIST Security & Schemas: Database Auditing Auditing Database Activity Traditional Auditing Unified Auditing Create Audit Policy Security & Schemas: SQL Loader Loader Concepts Loader From the Command Line control File Options Load Methods Loader Express Mode Loader From EM Security & Schemas: Export & Import Manage Directory Objects The Data Pump Architecture Data Pump Export Data Pump Import Data Pump Dictionary Views Using the EM CC Interface Performance & Availability: Managing Performance & SQL Tuning Management Advisory Framework Performance Monitoring & AWR The SQL Tuning Advisor Monitoring Exceptions with Metrics Performance & Availability: Data Concurrency About System & User Locks Monitor & Manage User Locks Moitor Locks with Data Dictionary Manage Locks with EM Performance & Availability: Backup & Recovery Concepts Backup & Recovery Structures Managing REDO Data Configuring for Recoverability Instance Recovery Recoverability Checklist Additional course details: Nexus Humans Oracle 12c Administration II training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c Administration II course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c Administration II
Delivered OnlineFlexible Dates
Price on Enquiry

Overview of Housing Officer Join our Housing Officer course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Housing Officer course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Housing Officer course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This Housing Officer Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Housing Officer. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Housing Officer course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Housing Officer is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Housing Officer course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Housing Officer Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Frequently Asked Questions (FAQ's) Q. How do I purchase a course? 1. You need to find the right course on our IOMH website at first. You can search for any course or find the course from the Courses section of our website. 2. Click on Take This Course button, and you will be directed to the Cart page. 3. You can update the course quantity and also remove any unwanted items in the CART and after that click on the Checkout option and enter your billing details. 4. Once the payment is made, you will receive an email with the login credentials, and you can start learning after logging into the portal. Q. I have purchased the course when will I be able to access the materials? After purchasing the course, you should receive an email with the login credentials within 24 hours. Please check your spam or junk folder if you didn't receive it in your inbox. You can access your courses by logging into your account. If you still need any assistance, please get in touch with our Customer Support team by providing the details of your purchase. Q. I haven't received my certificate yet. What should I do? You should receive your Digital Certificate within 24 hours after placing the order, and it will take 3-9 days to deliver the hard copies to your address if you are in the UK. For International Delivery, it will take 20-25 days. If you require any assistance, get in touch with our dedicated Customer Support team, and your queries/issues will be dealt with accordingly. Q. I don't have a credit/debit card, what other methods of payment do you accept? You can make the payment using PayPal or you can Bank Transfer the amount. For Bank transfer you will require an invoice from us and you need to contact our Customer Support team and provide details of your purchase to get the invoice. After that, you will receive an email with the invoice and bank details and you can make the payment accordingly. Q. Can I do the courses from outside UK? We are an online course provider, and learners from anywhere in the world can enrol on our courses using an internet-connected device. Q. When I log into the account it says 'Contact Administrator'. To resolve this issue, please log out of your account and then log back in. Course Curriculum Housing Officer Training Module 1: Introduction to Social Housing 00:15:00 Module 2: Career Prospects of Social Housing Manager 00:25:00 Module 3: Tenant Selection and Tenant Management 00:28:00 Module 4: Managing Rental Income and Arrears 00:24:00 Module 5: Time Management 00:37:00 Module 6: Organisational Skills 00:27:00 Module 7: Communication Skills 00:27:00 Module 8: Negotiation Techniques 00:19:00 Module 9: Dealing with Anti-Social Behaviours 00:39:00 Module 10: Stress Management 00:19:00 Module 11: Maintenance, Safety, and Security of Social Housing 00:32:00 Module 12: Resident Involvement in Social Housing 00:31:00

Housing Officer
Delivered Online On Demand5 hours 23 minutes
£11.99

Exotic Animal Care Level 3

4.7(160)

By Janets

Explore advanced techniques in Exotic Animal Care with our Level 3 course. Gain in-depth knowledge of veterinary practices, nutrition, and specialized care for a variety of exotic species. Elevate your skills and become a sought-after professional in the field of exotic animal health. Enroll now for a comprehensive and hands-on learning experience.

Exotic Animal Care Level 3
Delivered Online On Demand3 weeks
£9.99

Diploma in Medical Secretary

4.7(160)

By Janets

Discover the Diploma in Medical Secretary program, equipping you with essential administrative skills tailored for the healthcare industry. Learn medical terminology, office management, and specialized communication techniques for a rewarding career as a valued medical secretary.

Diploma in Medical Secretary
Delivered Online On Demand14 days
£9.99