Duration 3 Days 18 CPD hours This course is intended for System integrators, Consultants, Solution architects Overview By the end of the course, you should be able to meet the following objectives: Create a vSphere design given a case study Identify and assess the business objectives of the vSphere environment Identify business requirements, constraints, assumptions, and risks, for all layers in the vSphere environment Apply a framework to a design Analyze design choices for vCenter, ESXi, storage, networking, vSphere clusters, and virtual machines Identify design decisions to ensure manageability, which include scalability, capacity planning and lifecycle management Identify design decisions to ensure that the vSphere environment is highly available Identify design decisions to ensure that the vSphere environment performs well Identify design decisions to ensure that the vSphere environment is secure Identify design decisions to ensure that the vSphere environment can recover from data loss or disaster This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Describe various design framework principles Follow a proven process to design a virtualization solution Define customer business objectives and requirements Use a systematic method to evaluate and document a conceptual model Create a logical design from a conceptual model Recognize key information contained in the physical design Designing for Manageability: Capacity Planning Make capacity planning design decisions that adhere to business requirements Design capacity planning strategies that meet the needs of the vSphere environment and follow VMware best practices Calculate compute and storage requirements for the VMs in the vSphere environment Designing for Manageability: Scalability Make scalability design decisions that adhere to business requirements Design scalability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Manageability: Lifecycle Management Make lifecycle management design decisions that adhere to business requirements Design lifecycle management strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Availability Make availability design decisions that adhere to business requirements Design availability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Performance Make performance design decisions that adhere to business requirements Design performance strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Security Make security design decisions that adhere to business requirements Design security strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Recoverability Make recoverability design decisions that adhere to business requirements Design recoverability strategies that meet the needs of the vSphere environment and follow VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [V8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [V8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org
Duration 1.5 Days 9 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge communicating, etiquette, professionalism and time management for the office environment. Overview Upon successful completion of this course, students will be able to communicate, be professional and manage their time effectively in a business environment. In this course, students will learn how to communicate, act and manage time effective in a business environment. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives The Big Picture What is Communication? How Do We Communicate? Other Factors in Communication Understanding Communication Barriers An Overview of Common Barriers Language Barriers Cultural Barriers Differences in Time and Place Paraverbal Communication Skills The Power of Pitch The Truth about Tone The Strength of Speed Non-Verbal Communication Understanding the Mehrabian Study All About Body Language Interpreting Gestures Speaking like a Star S = Situation T = Task A = Action R = Result Summary Listening Skills Seven Ways to Listen Better Today Understanding Active Listening Sending Good Signals to Others Asking Good Questions Open Questions Closed Questions Probing Questions Appreciative Inquiry The Purpose of AI The Four Stages Examples and Case Studies Mastering the Art of Conversation Level One: Discussing General Topics Level Two: Sharing Ideas and Perspectives Level Three: Sharing Personal Experiences Our Top Networking Tips Advanced Communication Skills Understanding Precipitating Factors Establishing Common Ground Using ?I? Messages Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Principles of Professional Behavior Always be Your Best Meeting and Greeting Sending Social Invitations to Business Associates Interview Etiquette Interviewing Before the Interview In the Waiting Room During the Interview After the Interview Job Fair Interviews Planning & Attending Business Meetings Office Meetings Meal Meetings Electronic Etiquette Voicemail Cell Phones Email Multiculture Etiquette Defining the Challenge Five Steps to Dealing with Diversity Guidelines for Managing Diverse Relationships Time Management Concepts Benefits of better time utilization Who controls your schedule? Your Job: What You Are Responsible for Accomplishing? Your job responsibilities Setting objectives Setting priorities How to Use Your Time Gathering data-the time log Analyzing the data Delegation: Working Through Others Why some people don't delegate Levels of delegation How to delegate Benefits of delegation Getting started Planning: Keys to Achievement Planning: Keys to Achievement Coping with Common Time Wasters Coping with self-generated time wasters Coping with environmental time wasters Personal Needs that Get in the Way of Effective Time Utilization Needs profile analysis Self-assessment questionnaire Applying needs assessment results Planning for Improvement Six tips for effective time management Planning for improved time utilization Follow-Up: Staying on Track Time savings progress report Time savings progress chart Time management progress survey Additional course details: Nexus Humans Business Soft Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Soft Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Understand how to effectively manage conflict and learn that conflict can be healthy and need not damage relationships. Course overview Duration: 1 day (6.5 hours) Conflict and differences of opinion are inevitable in the today’s fast moving, complex business world, some would argue they are even necessary. This highly interactive and practical course addresses the many aspects of effectively managing conflict and will help you ensure that conflict can be healthy and need not damage the relationship. This workshop has been specifically designed to give you an opportunity to learn and test a range of influencing and conflict handling models and techniques. The course is aimed at anyone who interacts with others on a regular basis. Objectives By the end of the course you will be able to: Utilise influencing skills to pre-empt and defuse conflict Resolve conflict by choosing the right approach Recognise the impact of non-verbal communication in managing conflict Use language skills necessary to get you message across in the ‘right’ way Present your case in a reasonable and responsible manner Identify behaviours that can help or hinder interactions with others Apply different techniques for managing conflict positively and for dealing with aggression Content Developing Influence Networking Sources of influence Influencing techniques Effective Behaviour Choosing the right approach Techniques to pre-empt or defuse conflict Behavioural styles and their impact on working relationships Triggers to aggressive behaviour Managing conflict flash points Dealing with different behaviour types Developing Skills Communication skills in conflict situations Using the right language Verbal and non verbal communications Managing our body language Your conflict management style analysis Thomas Killman Conflict Handling Instrument Working in groups Practical exercises and case studies The language of mediation Transactional Analysis Practical Practical exercises Case studies Personal action planning
This video course is designed to teach you about the latest WidgetKit developments in iOS 16, and how to use them with SwiftUI. You will learn about new features such as live activities and Dynamic Island, and explore how to create dynamic widgets for your iOS applications using SwiftUI. It's a great way to enhance your skills and create high-quality widgets.
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00
Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00
Register on the Basic to Advanced UX Design today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Basic to Advanced UX Design course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of- Video lessons Online study supplies Assignment Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who is this course for? The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Course Content Unit 01: UX/UI Course Introduction Learn UX/UI Course Overview 00:05:00 Section Overview 00:04:00 UX vs UI 00:04:00 UX/UI Designer Marketplace 00:05:00 Overview of UX Roles 00:06:00 Unit 02: Introduction to the Web Industry Web Industry Section Overview 00:03:00 The Phases of Web Development 00:13:00 Designer Responsibilities (working in a team) 00:09:00 Roles & Descriptions (working in a team) 00:05:00 Agile Approach To Project Management 00:12:00 Scrum - Flexible Framework 00:06:00 Project Management Apps 00:13:00 XD Lesson - Introduction 00:13:00 Unit 03: Foundations of Graphic Design Graphic Design Section Overview 00:02:00 The Psychology of Color 00:13:00 Color Wheel & Color Schemes 00:06:00 Working with Fonts 00:10:00 Working With Icons 00:04:00 XD Lesson - Tools, Object Manipulation and Components 00:13:00 XD Lesson - Font Styles and Artboard Settings 00:07:00 Graphic Design Software Tools 00:03:00 Adobe XD lesson 4 - Icons & Vector Graphics 00:14:00 Unit 04: UX Design (User Experience Design) UX Design Section Overview 00:04:00 What is User Experience Design? (UX) 00:09:00 UX Design Process 00:03:00 The UX Analysis Process 00:08:00 Working with User Profiles 00:03:00 Understanding User Pain Points 00:03:00 XD Lesson 5 Class Project: Сompetitive Analysis 00:10:00 Developing a Persona Part 1 00:05:00 Developing a Persona Part 2 00:05:00 Customer Journey 00:04:00 Customer Journey vs Sales Funnel 00:04:00 3 Phases of a Sales Funnel 00:07:00 4 Stages of a Sales Funnel 00:06:00 Macro/Micro Conversions 00:05:00 Stages of Market Sophistication 00:06:00 Lead Generation Funnel 00:06:00 Digital Product Sales Funnel 00:05:00 7 Principles of Influence 00:12:00 Age Based Influence Triggers 00:06:00 Gender Influence Triggers 00:06:00 Interest Based Marketing 00:04:00 Understanding User Flow 00:08:00 XD Lesson 6 Class Project: Userflow - Your first UX deliverable 00:07:00 Working with Story Boards 00:05:00 XD Lesson 7 Class Project: Crafting a Story board 00:09:00 Working with Moodboards 00:04:00 XD Lesson 8 Class Project: Creating Moodboard 00:11:00 Sitemap & Information Architecture 00:07:00 XD Lesson - Class Project: App Architecture 00:09:00 Low and Hi Fidelity Wireframes 00:03:00 XD Lesson - Class Project: Login Screen Wireframe Using Material Design 00:08:00 Working with Prototypes 00:04:00 XD Lesson - Class Project: Home Screen Wireframe and Linking 00:07:00 XD Lesson - Class Project: Adding Interaction to Wireframes 00:10:00 Testing and Evaluating 00:11:00 UX Deliverables 00:03:00 UX Design Conclusion 00:01:00 Unit 05: UI Design (User Interface Design) UI Design Section Overview 00:03:00 UI Design Overview 00:03:00 Types of Interfaces 00:10:00 Landing Pages Overview 00:10:00 XD Lesson - Using Grids in XD 00:08:00 XD Lesson - Single Card design 00:13:00 UI Controls 00:07:00 UI Navigational Components 00:12:00 Header Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Header Design 00:10:00 XD Lesson - Mobile & Desktop: Dropdown Design 00:06:00 Common Layouts Overview 00:08:00 XD Lesson - Common Layouts 00:07:00 Mobile & Desktop Footer Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Footer Design 00:06:00 Mobile & Desktop Button Design Overview 00:05:00 XD Lesson - Mobile & Desktop: Button Design 00:10:00 XD Lesson - Mobile & Desktop: Input Design 00:07:00 Mobile & Desktop Filter Search Bar Design Overview 00:06:00 Adobe XD Lesson - Mobile & Desktop: Filter Design 00:07:00 Adobe XD Lesson - Mobile & Desktop: Search Design 00:03:00 UI Kit Overview 00:05:00 Adobe XD Lesson - Desktop and Mobile: UI Kit 00:06:00 Microinteractions Overview 00:05:00 Adobe XD lesson - Microinteractions 00:07:00 Unit 06: Optimization Optimization Section Overview 00:02:00 Feedback Review & Getting Referrals 00:04:00 'Above the Fold' Rule 00:04:00 Adobe XD lesson - Designing a Powerful Above the Fold 00:08:00 Using Analytics For Optimization 00:05:00 Heat Maps & Element Placements 00:04:00 Crafting A Usability Report Overview 00:08:00 Adobe XD lesson - Crafting Reports in XD 00:20:00 Unit 07: Starting a Career in UX/UI Design Careers in UX/UI Section Overview 00:06:00 Your Daily Productivity Hub 00:14:00 How To Start Freelancing 00:08:00 Client Consulting 00:04:00 Building a Brand 00:10:00 Personal Branding 00:07:00 The Importance of Having a Website 00:08:00 Creating a Logo 00:05:00 Step by Step Website Setup 00:17:00 UI Templates 00:06:00 Logo Templates 00:04:00 Creating a Business Email 00:06:00 Networking Do's and Don'ts 00:04:00 Top Freelance Websites 00:05:00 UX/UI Project Scope Questions 00:10:00 Laser Focus & Productivity Tools 00:06:00 The Places to Find UX Jobs 00:05:00
Description: To work in an office properly, you need to achieve some basic etiquette and communication skills along with your department related skill. Throughout the course, you will know all the essential tips and techniques for maintaining an excellent workforce in your office environment. Like other bundled video course, the present course is divided into several sections and sub-sections. The first section, Introduction to HR concepts, discusses the fundamental HR terms including the employee recruitment, training and managing conflict while the second part Communication Essential describes the proper format of communication. Communication varies based on your purpose. In the Communication course, you will be introduced to business communication, written communication, verbal and non-verbal communication, etc. Then the Professionalism in the Office Skills teaches you the strategies for increasing your professional image. On the other hand, you will know the business etiquette and manner in the Business Etiquette and Professionalism section. Next, the part Thinking Critically helps you to consider any situation critically so that you can take the right decision at the right time. After that, Time Management section guides you to manage your time efficiently. Finally, you will understand the present condition and market position of an organisation to decide the further step for your organisation in The Strategic Planning video lessons. In short, after completing the course, you will learn the essential etiquette for organising a competent workforce. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Workplace Essentials Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Workplace Essentials Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Human Resources Assistant Introduction Human Resources Assistant FREE 00:10:00 Potential Careers 00:05:00 Attracting and Retaining Employees HRM Overview 00:13:00 Forecasting Demand 00:10:00 Cultural Diversity 00:11:00 Diversity Survey 00:09:00 Recruiting, Selection, and Orientation Job Analysis 00:10:00 Application 00:20:00 Bad Resume 00:05:00 Good Resume 00:12:00 Cover Letter 00:10:00 Selection 00:11:00 Form I-9 00:17:00 Form W-9 00:07:00 Form W-4 00:10:00 Form 1095-B 00:07:00 Compensation and Benefits 00:17:00 Training and Development Personal and Professional Development 00:14:00 Training Evaluation Form 00:12:00 Performance Appraisal Performance Appraisal 00:19:00 Appraisal 00:14:00 Legal Environment of HRM National Labor Relations Act 00:12:00 Labor-Management Relations Act 00:14:00 Occupational Safety and Health Act 00:13:00 Motivating Employees Motivation 00:17:00 Physiological Needs 00:16:00 Motivation-Hygiene Theory 00:12:00 Firm Characteristics 00:22:00 Contemporary Motivation Theory Weakness of Maslow and Herzberg's Theories 00:18:00 Expectancy Theory 00:13:00 Motivation Techniques Management by Objectives 00:17:00 Behavior Modification 00:19:00 Telecommuting 00:20:00 Teams and Teamwork What is a Team? 00:09:00 Stages of Development 00:06:00 Team Cohesiveness 00:09:00 Business Communication Identifying Basic Communication Techniques FREE 00:09:00 Formal and Informal Communication 00:02:00 Verbal and Non-verbal Communication Describing Verbal and Non-verbal Communication 00:04:00 Understanding Body Language 00:05:00 Making Effective Presentations 00:10:00 Fundamentals of Productive Meetings 00:08:00 Written Communication Written Communication 00:13:00 Electronic Communication Electronic Communication 00:19:00 Communicating with Graphics Creating Graphics for Business Communication 00:04:00 Communicating Static Information 00:03:00 Communicating Dynamic Information 00:03:00 Effectively Working for Your Boss Representing Your Boss 00:06:00 Communicating Your Boss's Decisions 00:03:00 Supporting Your Boss and Colleagues 00:04:00 Building a Partnership with Your Boss 00:13:00 Positioning Yourself as a Professional Attitude in the Workplace FREE 00:10:00 Professionalism 00:03:00 Making Changes through Personal Accountability 00:07:00 Enhancing Your Professional Image Your Image as a Whole 00:05:00 Becoming More Marketable 00:03:00 Communicating and Image 00:08:00 Expanding Your Skills Time Management 00:14:00 Project Management Techniques 00:03:00 Making Decisions 00:06:00 Communicating for Results Keys to Effective Communication 00:26:00 Presentations 00:09:00 Meetings 00:07:00 Building Relationships and Networks Work and Your Personality 00:05:00 Networking 00:07:00 Roles in the Office MRP 00:18:00 Principles of Professional Behavior What is Etiquette? FREE 00:05:00 Always Be Your Best 00:12:00 Always Be Your Best When Meeting and Greeting 00:06:00 Interview Etiquette Types of Interviews 00:07:00 Planning for the Interview 00:07:00 During the Interview 00:13:00 Planning and Attending Business Meetings Types of Meetings 00:06:00 Planning Conference Call Meetings 00:10:00 Meal Meetings 00:09:00 Electronic Etiquette Voicemail 00:08:00 Instant Messaging 00:09:00 Multicultural Etiquette Five Steps to Dealing with Diversity 00:13:00 Facing New Problems The Critical Thinking Process FREE 00:24:00 Group Dynamics 00:17:00 Critical Thinking Methods 00:04:00 Problem Solving Approaches 00:09:00 Establishing the Problem A Identify the Problem 00:08:00 Exploring the Problem 00:06:00 Discovering the Solution Assembling Potential Ideas 00:09:00 Determining the Best Solution 00:04:00 Evaluating Cost and Benefit 00:05:00 Building Your Case 00:02:00 Accepting a Decision Accepting a Decision 00:13:00 Identifying Goals Identifying Goals FREE 00:10:00 Effective Energy Distribution Energy Distribution 00:09:00 Time Logs 00:11:00 Working with Your Personal Style Personal World View 00:10:00 Strengths 00:09:00 Building Your Toolbox A Building Your Toolbox 00:10:00 Establishing Your Action Plan Establishing Your Action Plan 00:11:00 Preparing for the Strategic Planning Process Preparing for the Strategic Planning Process FREE 00:16:00 Establish a Committee 00:06:00 Gather Operational Data 00:13:00 Initiating the Strategic Planning Process Develop a Mission Statement 00:12:00 Develop a Vision Statement 00:06:00 Assess Internal and External Environments 00:12:00 Performing SWOT Analysis 00:08:00 Developing the Strategic Plan Prioritize What the Strategic Plan Will Address 00:03:00 Set Goals and Objective 00:07:00 Develop Strategy for Achieving Goals 00:02:00 Draft the Strategic Plan 00:09:00 Executing the Plan Assign Responsibility and Authority 00:10:00 Establish a Monitoring System 00:06:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00