• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2508 Courses delivered Online

Ethical Hacking with Kali Linux

4.9(27)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

CompTIA Security+ (SY0-601)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

Business Management During Recession

By Compete High

🌟 Unlock the Secrets to Thriving in Turbulent Times with Business Management During Recession Course! 🌟 In the ever-evolving landscape of the business world, one thing remains certain: change is inevitable. And in times of economic downturns and recessions, businesses face unprecedented challenges. But what if you could turn adversity into opportunity? Introducing our transformative course, Business Management During Recession!   🚀 Benefits of Taking Our Course: Strategic Resilience: Learn how to navigate through economic downturns with resilience and strategic foresight. Discover actionable strategies to adapt your business model, streamline operations, and identify new growth opportunities even in the toughest of times. Financial Agility: Gain insights into managing finances effectively during a recession. Understand cash flow management, cost-cutting strategies, and smart investment decisions to safeguard your business's financial health and emerge stronger than ever. Leadership Excellence: Equip yourself with the leadership skills necessary to inspire and motivate your team during challenging times. Learn how to foster a culture of innovation, collaboration, and adaptability to steer your organization towards success despite economic uncertainties. Market Adaptation: Explore innovative ways to pivot your business and adapt to changing market dynamics. From rebranding strategies to exploring new market segments, discover how to stay ahead of the curve and maintain a competitive edge. Risk Management: Master the art of risk management and contingency planning to mitigate potential threats to your business. Identify key risk factors, develop contingency plans, and ensure business continuity even in the face of adversity. Networking Opportunities: Connect with industry experts and fellow entrepreneurs to exchange insights, best practices, and valuable resources. Expand your professional network and gain access to exclusive opportunities for collaboration and growth.   🎯 Who is this for? Entrepreneurs: Whether you're a seasoned entrepreneur or just starting your journey, this course is tailored to help you navigate the complexities of managing a business during a recession. Gain the knowledge and tools you need to not only survive but thrive in turbulent economic times. Business Owners: As a business owner, staying ahead of the curve is essential for long-term success. This course provides invaluable insights and strategies to help you adapt your business model, protect your bottom line, and position your company for sustained growth. Managers and Executives: For managers and executives tasked with steering their organizations through economic uncertainties, this course offers essential guidance and practical solutions. Enhance your leadership skills, financial acumen, and strategic decision-making abilities to lead your team with confidence and resilience. Students and Professionals: Whether you're a student aspiring to enter the world of business or a seasoned professional looking to expand your skill set, this course offers a valuable opportunity to deepen your understanding of business management in challenging economic environments.   🚀 Career Path: Business Consultant: Armed with expert knowledge in business management during recessions, you'll be equipped to offer strategic guidance and advisory services to businesses seeking to navigate through turbulent economic times. Financial Analyst: Specialize in analyzing market trends, assessing risk factors, and advising businesses on financial strategies to mitigate the impact of recessions and maximize profitability. Entrepreneur: Launch and grow your own business ventures with confidence, knowing that you have the skills and knowledge to adapt and thrive in any economic climate. Corporate Leader: Rise through the ranks of corporate leadership by demonstrating your ability to steer organizations through economic downturns with resilience, innovation, and strategic vision.   Don't let economic downturns dictate the fate of your business. Empower yourself with the knowledge, skills, and strategies to not only survive but thrive in turbulent times. Enroll in our Business Management During Recession course today and take the first step towards a brighter and more resilient future for your business! 🌟   FAQ (Frequently Asked Questions) - Business Management During Recession Q1: What are the key strategies for managing a business during a recession? A recession requires businesses to adapt and strategize effectively to navigate through challenging economic times. Key strategies include implementing cost-cutting measures such as reducing discretionary spending, renegotiating contracts with suppliers, and optimizing operational efficiency. Additionally, diversifying revenue streams, focusing on customer retention, and investing in marketing efforts to maintain brand visibility are crucial. Businesses should also prioritize cash flow management, maintaining adequate reserves, and exploring opportunities for innovation and strategic partnerships. Q2: How can businesses protect themselves from the impact of a recession? Businesses can protect themselves from the impact of a recession by proactively assessing their financial health and implementing risk mitigation strategies. This includes building up cash reserves during periods of economic growth, reducing debt obligations, and maintaining a strong relationship with lenders or investors. Businesses should also continuously monitor market trends and adjust their strategies accordingly, diversifying their customer base and product offerings to reduce vulnerability to economic downturns. Q3: What role does leadership play in managing a business during a recession? Leadership plays a critical role in guiding businesses through challenging economic conditions. Effective leaders must inspire confidence, foster resilience among employees, and communicate transparently about the company's goals and challenges. They should also demonstrate adaptability and decisiveness in making tough decisions, such as restructuring or downsizing if necessary, while prioritizing the well-being of their workforce. Moreover, leaders should lead by example, staying informed about industry trends and best practices, and encouraging a culture of innovation and continuous improvement. Q4: How can businesses maintain employee morale and engagement during a recession? Maintaining employee morale and engagement during a recession is essential for sustaining productivity and retaining talent. Businesses can achieve this by fostering open communication channels, providing regular updates about the company's performance and future plans, and soliciting feedback from employees on ways to improve operations. Offering opportunities for professional development, recognizing and rewarding employee contributions, and promoting a positive work-life balance can also boost morale. Additionally, transparent and empathetic leadership, coupled with a supportive company culture, can help alleviate anxiety and uncertainty among employees. Q5: What resources are available to businesses for managing through a recession? Businesses have access to various resources and support mechanisms to help them navigate through a recession. Government agencies often provide assistance programs, grants, or tax incentives aimed at supporting small businesses during economic downturns. Additionally, industry associations, chambers of commerce, and business networks offer resources such as workshops, training programs, and mentorship opportunities. Financial institutions may provide guidance on accessing credit or restructuring debt to improve liquidity. Moreover, consulting firms and business advisors can offer tailored advice and strategies based on industry-specific challenges and opportunities. By leveraging these resources, businesses can better position themselves to weather the effects of a recession and emerge stronger in the long run. Course Curriculum Module 1 Weathering The Storm Weathering The Storm 00:00 Module 2 Understanding The Mortgage Meltdown Understanding The Mortgage Meltdown 00:00 Module 3 Personal Development Personal Development 00:00 Module 4 Economic Recession Strategy Economic Recession Strategy 00:00 Module 5 Recession Proofing Recession Proofing 00:00

Business Management During Recession
Delivered Online On Demand6 hours
£4.99

List Building

By Compete High

🚀 Unlock the Secrets to Rapid Growth with 'List Building' Course! 🚀 Are you ready to skyrocket your business to new heights? Imagine having a powerful tool at your disposal that can consistently attract, engage, and convert your ideal audience into loyal customers. Look no further than our groundbreaking course, 'List Building'! 🌟 In today's digital age, building and nurturing a robust email list is the cornerstone of successful marketing strategies. Whether you're an entrepreneur, small business owner, marketer, or aspiring influencer, mastering the art of list building is non-negotiable for sustainable growth and profitability. 📈   🔥 Why List Building Matters: Your email list is your most valuable asset in the digital realm. It's not just about collecting email addresses; it's about cultivating relationships, delivering value, and driving conversions. With a targeted and engaged list, you have the power to: Increase Revenue: Convert leads into paying customers with targeted email campaigns that speak directly to their needs and interests. Build Authority: Establish yourself as an industry leader by consistently delivering valuable content and nurturing meaningful connections with your audience. Boost Engagement: Keep your audience engaged and excited about your brand with personalized emails, exclusive offers, and compelling storytelling. Drive Traffic: Direct qualified leads to your website, blog, or landing pages, amplifying your online presence and driving organic traffic. Maximize ROI: Achieve a higher return on investment from your marketing efforts by leveraging the cost-effectiveness and high-conversion rates of email marketing.   🎯 Who is this for? Our 'List Building' course is tailored for anyone looking to unlock the full potential of email marketing and take their business or brand to the next level. Whether you're a: Entrepreneur: Launching a startup or scaling your business? Mastering list building is essential for attracting and retaining customers. Small Business Owner: Strengthen your customer relationships, drive repeat purchases, and increase brand loyalty with targeted email campaigns. Marketer: Enhance your marketing skills and stay ahead of the curve in a rapidly evolving digital landscape. Aspiring Influencer: Build a loyal fan base, monetize your content, and turn followers into loyal subscribers with compelling email strategies. No matter your industry or niche, if you have a product, service, or message to share, this course is your ticket to success! 💼   🚀 Career Path: Elevate your career prospects and open doors to new opportunities with a solid foundation in list building and email marketing. Upon completing our course, you'll be equipped with the knowledge and skills to: Advance Your Career: Stand out in the job market and secure high-paying roles in digital marketing, content creation, or social media management. Launch Your Business: Turn your entrepreneurial dreams into reality by leveraging the power of email marketing to grow your customer base and increase sales. Expand Your Network: Connect with industry experts, thought leaders, and like-minded professionals to collaborate on projects, exchange ideas, and explore new business ventures. Achieve Financial Freedom: Take control of your financial future by mastering list building techniques that generate consistent revenue streams and passive income opportunities.   Don't let another day go by without harnessing the full potential of email marketing to fuel your success! Enroll in our 'List Building' course today and unlock the keys to sustainable growth, profitability, and long-term success. 🌟 🔑 Ready to take the plunge? Join us on this transformative journey and start building your empire one email at a time! 💌   FAQ (Frequently Asked Questions) for List Building Course Q1: What is list building, and why is it important for my business? List building refers to the process of creating a database of contacts or subscribers who have expressed interest in receiving information, updates, or offers from your business. It typically involves collecting email addresses, but can also include other contact information such as phone numbers or social media handles. List building is crucial for businesses because it allows you to directly communicate with your audience, nurture relationships, and promote your products or services. Having a quality email list enables you to reach out to potential customers, increase brand awareness, and drive sales. Q2: How can I start building my email list from scratch? To start building your email list from scratch, you can implement various strategies such as creating lead magnets like ebooks or free guides to incentivize people to sign up, adding opt-in forms to your website or blog, running contests or giveaways, and promoting your email list on social media platforms. Additionally, you can leverage networking events, webinars, and other opportunities to collect email addresses from interested individuals. It's essential to offer valuable content and make it easy for people to subscribe to your list to maximize your sign-up rate. Q3: What are some best practices for list building and email marketing? Some best practices for list building and email marketing include obtaining explicit consent from subscribers before adding them to your list (ensuring compliance with privacy regulations such as GDPR or CAN-SPAM), personalizing your email content to cater to the interests and preferences of your audience, segmenting your email list based on demographics, behaviors, or purchase history to send targeted messages, and regularly cleaning your list to remove inactive or unengaged subscribers. Additionally, it's crucial to monitor your email deliverability, open rates, and click-through rates to optimize your campaigns for better results. Q4: How do I grow and maintain my email list over time? To grow and maintain your email list over time, you can continue implementing list-building strategies such as creating fresh and relevant content, offering exclusive deals or promotions to subscribers, engaging with your audience through email newsletters or automated sequences, and encouraging subscribers to refer their friends or colleagues. It's also essential to regularly evaluate and adjust your tactics based on your analytics data and feedback from subscribers to ensure sustained growth and engagement. Q5: What tools and platforms can I use for effective list building and email marketing? There are various tools and platforms available to help you with list building and email marketing, including email marketing software like Mailchimp, Constant Contact, or ConvertKit, which offer features such as customizable opt-in forms, automated email sequences, and analytics tracking. Additionally, you can use lead generation plugins for your website or landing page builders like Leadpages or Unbounce to create high-converting opt-in pages. Social media advertising platforms such as Facebook Ads or LinkedIn Ads can also be effective for reaching new audiences and driving traffic to your opt-in forms. It's essential to choose tools that align with your business goals, budget, and technical requirements to maximize your list-building efforts. Course Curriculum Module 1 Simple Ways To Build Your List Simple Ways To Build Your List 00:00 Module 2 Mailing and Subscriber Lists Mailing and Subscriber Lists 00:00 Module 3 Learning The Ropes Learning The Ropes 00:00 Module 4 Double Opt-In Lists Double Opt-In Lists 00:00 Module 5 Maintaining Your Opt-In List Maintaining Your Opt-In List 00:00

List Building
Delivered Online On Demand5 hours
£4.99

Business Partnering

By Underscore Group

Learn the skills and mindset to become a business partner, align your expertise with the organisational goals, drive growth, and shape the future of your company. Course overview Duration: 1 day (6.5 hours) This is a highly interactive and practical course which will help you to understand the role of Business Partnering and the key skills needed to be successful in the role. The course is designed specifically to give you an opportunity to explore the role and test a range of techniques to improve your strategic working as well as your influencing and relationship building skills. This course is aimed at individuals who work cross-functionally and with other people to achieve business results and is particularly helpful for those who engage frequently with senior managers and executives. Objectives  By the end of the course you will be able to: Describe the role of Business Partner and the benefit to the business Develop stronger engagement with all internal and external stakeholders Influence without authority Build positive relationships Handle robust conversations Be forward thinking, not reactive Act as a change agent Communicate with confidence and credibility Content Understanding the role of the Business Partner What is Business Partnering from an individual, departmental and business view Using a psychometric test to look at where your strengths are and how you can use them effectively in the role Developing Relationships Creating a powerful first impression. Communication skills Understanding different communication styles Being more proactive in developing key relationships Stakeholder engagement Presenting ideas in a confident and articulate way Understanding and developing trust Connecting with people Networking Influencing and Negotiating Influencing and persuading others Dealing with conflict and difficult conversations Becoming a trusted advisor/Business Partner Advanced questioning skills and techniques to get to the root of a problem Strategic Thinking Develop the mind-set and strategic capability to play a more proactive leading role in the business

Business Partnering
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island

By Packt

This video course is designed to teach you about the latest WidgetKit developments in iOS 16, and how to use them with SwiftUI. You will learn about new features such as live activities and Dynamic Island, and explore how to create dynamic widgets for your iOS applications using SwiftUI. It's a great way to enhance your skills and create high-quality widgets.

Mastering WidgetKit in SwiftUI 4, iOS 16 with Dynamic Island
Delivered Online On Demand12 hours 51 minutes
£82.99

Advanced Diploma in User Experience UI/UX Design

4.7(160)

By Janets

Register on the Basic to Advanced UX Design today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Basic to Advanced UX Design course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of- Video lessons Online study supplies Assignment Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who is this course for? The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.   Course Content Unit 01: UX/UI Course Introduction Learn UX/UI Course Overview 00:05:00 Section Overview 00:04:00 UX vs UI 00:04:00 UX/UI Designer Marketplace 00:05:00 Overview of UX Roles 00:06:00 Unit 02: Introduction to the Web Industry Web Industry Section Overview 00:03:00 The Phases of Web Development 00:13:00 Designer Responsibilities (working in a team) 00:09:00 Roles & Descriptions (working in a team) 00:05:00 Agile Approach To Project Management 00:12:00 Scrum - Flexible Framework 00:06:00 Project Management Apps 00:13:00 XD Lesson - Introduction 00:13:00 Unit 03: Foundations of Graphic Design Graphic Design Section Overview 00:02:00 The Psychology of Color 00:13:00 Color Wheel & Color Schemes 00:06:00 Working with Fonts 00:10:00 Working With Icons 00:04:00 XD Lesson - Tools, Object Manipulation and Components 00:13:00 XD Lesson - Font Styles and Artboard Settings 00:07:00 Graphic Design Software Tools 00:03:00 Adobe XD lesson 4 - Icons & Vector Graphics 00:14:00 Unit 04: UX Design (User Experience Design) UX Design Section Overview 00:04:00 What is User Experience Design? (UX) 00:09:00 UX Design Process 00:03:00 The UX Analysis Process 00:08:00 Working with User Profiles 00:03:00 Understanding User Pain Points 00:03:00 XD Lesson 5 Class Project: Сompetitive Analysis 00:10:00 Developing a Persona Part 1 00:05:00 Developing a Persona Part 2 00:05:00 Customer Journey 00:04:00 Customer Journey vs Sales Funnel 00:04:00 3 Phases of a Sales Funnel 00:07:00 4 Stages of a Sales Funnel 00:06:00 Macro/Micro Conversions 00:05:00 Stages of Market Sophistication 00:06:00 Lead Generation Funnel 00:06:00 Digital Product Sales Funnel 00:05:00 7 Principles of Influence 00:12:00 Age Based Influence Triggers 00:06:00 Gender Influence Triggers 00:06:00 Interest Based Marketing 00:04:00 Understanding User Flow 00:08:00 XD Lesson 6 Class Project: Userflow - Your first UX deliverable 00:07:00 Working with Story Boards 00:05:00 XD Lesson 7 Class Project: Crafting a Story board 00:09:00 Working with Moodboards 00:04:00 XD Lesson 8 Class Project: Creating Moodboard 00:11:00 Sitemap & Information Architecture 00:07:00 XD Lesson - Class Project: App Architecture 00:09:00 Low and Hi Fidelity Wireframes 00:03:00 XD Lesson - Class Project: Login Screen Wireframe Using Material Design 00:08:00 Working with Prototypes 00:04:00 XD Lesson - Class Project: Home Screen Wireframe and Linking 00:07:00 XD Lesson - Class Project: Adding Interaction to Wireframes 00:10:00 Testing and Evaluating 00:11:00 UX Deliverables 00:03:00 UX Design Conclusion 00:01:00 Unit 05: UI Design (User Interface Design) UI Design Section Overview 00:03:00 UI Design Overview 00:03:00 Types of Interfaces 00:10:00 Landing Pages Overview 00:10:00 XD Lesson - Using Grids in XD 00:08:00 XD Lesson - Single Card design 00:13:00 UI Controls 00:07:00 UI Navigational Components 00:12:00 Header Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Header Design 00:10:00 XD Lesson - Mobile & Desktop: Dropdown Design 00:06:00 Common Layouts Overview 00:08:00 XD Lesson - Common Layouts 00:07:00 Mobile & Desktop Footer Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Footer Design 00:06:00 Mobile & Desktop Button Design Overview 00:05:00 XD Lesson - Mobile & Desktop: Button Design 00:10:00 XD Lesson - Mobile & Desktop: Input Design 00:07:00 Mobile & Desktop Filter Search Bar Design Overview 00:06:00 Adobe XD Lesson - Mobile & Desktop: Filter Design 00:07:00 Adobe XD Lesson - Mobile & Desktop: Search Design 00:03:00 UI Kit Overview 00:05:00 Adobe XD Lesson - Desktop and Mobile: UI Kit 00:06:00 Microinteractions Overview 00:05:00 Adobe XD lesson - Microinteractions 00:07:00 Unit 06: Optimization Optimization Section Overview 00:02:00 Feedback Review & Getting Referrals 00:04:00 'Above the Fold' Rule 00:04:00 Adobe XD lesson - Designing a Powerful Above the Fold 00:08:00 Using Analytics For Optimization 00:05:00 Heat Maps & Element Placements 00:04:00 Crafting A Usability Report Overview 00:08:00 Adobe XD lesson - Crafting Reports in XD 00:20:00 Unit 07: Starting a Career in UX/UI Design Careers in UX/UI Section Overview 00:06:00 Your Daily Productivity Hub 00:14:00 How To Start Freelancing 00:08:00 Client Consulting 00:04:00 Building a Brand 00:10:00 Personal Branding 00:07:00 The Importance of Having a Website 00:08:00 Creating a Logo 00:05:00 Step by Step Website Setup 00:17:00 UI Templates 00:06:00 Logo Templates 00:04:00 Creating a Business Email 00:06:00 Networking Do's and Don'ts 00:04:00 Top Freelance Websites 00:05:00 UX/UI Project Scope Questions 00:10:00 Laser Focus & Productivity Tools 00:06:00 The Places to Find UX Jobs 00:05:00

Advanced Diploma in User Experience UI/UX Design
Delivered Online On Demand12 hours 36 minutes
£25

Workplace Essentials Training - Complete Video Course

4.3(43)

By John Academy

Description: To work in an office properly, you need to achieve some basic etiquette and communication skills along with your department related skill. Throughout the course, you will know all the essential tips and techniques for maintaining an excellent workforce in your office environment. Like other bundled video course, the present course is divided into several sections and sub-sections. The first section, Introduction to HR concepts, discusses the fundamental HR terms including the employee recruitment, training and managing conflict while the second part Communication Essential describes the proper format of communication. Communication varies based on your purpose. In the Communication course, you will be introduced to business communication, written communication, verbal and non-verbal communication, etc. Then the Professionalism in the Office Skills teaches you the strategies for increasing your professional image. On the other hand, you will know the business etiquette and manner in the Business Etiquette and Professionalism section. Next, the part Thinking Critically helps you to consider any situation critically so that you can take the right decision at the right time. After that, Time Management section guides you to manage your time efficiently. Finally, you will understand the present condition and market position of an organisation to decide the further step for your organisation in The Strategic Planning video lessons. In short, after completing the course, you will learn the essential etiquette for organising a competent workforce. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Workplace Essentials Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Workplace Essentials Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Human Resources Assistant Introduction Human Resources Assistant FREE 00:10:00 Potential Careers 00:05:00 Attracting and Retaining Employees HRM Overview 00:13:00 Forecasting Demand 00:10:00 Cultural Diversity 00:11:00 Diversity Survey 00:09:00 Recruiting, Selection, and Orientation Job Analysis 00:10:00 Application 00:20:00 Bad Resume 00:05:00 Good Resume 00:12:00 Cover Letter 00:10:00 Selection 00:11:00 Form I-9 00:17:00 Form W-9 00:07:00 Form W-4 00:10:00 Form 1095-B 00:07:00 Compensation and Benefits 00:17:00 Training and Development Personal and Professional Development 00:14:00 Training Evaluation Form 00:12:00 Performance Appraisal Performance Appraisal 00:19:00 Appraisal 00:14:00 Legal Environment of HRM National Labor Relations Act 00:12:00 Labor-Management Relations Act 00:14:00 Occupational Safety and Health Act 00:13:00 Motivating Employees Motivation 00:17:00 Physiological Needs 00:16:00 Motivation-Hygiene Theory 00:12:00 Firm Characteristics 00:22:00 Contemporary Motivation Theory Weakness of Maslow and Herzberg's Theories 00:18:00 Expectancy Theory 00:13:00 Motivation Techniques Management by Objectives 00:17:00 Behavior Modification 00:19:00 Telecommuting 00:20:00 Teams and Teamwork What is a Team? 00:09:00 Stages of Development 00:06:00 Team Cohesiveness 00:09:00 Business Communication Identifying Basic Communication Techniques FREE 00:09:00 Formal and Informal Communication 00:02:00 Verbal and Non-verbal Communication Describing Verbal and Non-verbal Communication 00:04:00 Understanding Body Language 00:05:00 Making Effective Presentations 00:10:00 Fundamentals of Productive Meetings 00:08:00 Written Communication Written Communication 00:13:00 Electronic Communication Electronic Communication 00:19:00 Communicating with Graphics Creating Graphics for Business Communication 00:04:00 Communicating Static Information 00:03:00 Communicating Dynamic Information 00:03:00 Effectively Working for Your Boss Representing Your Boss 00:06:00 Communicating Your Boss's Decisions 00:03:00 Supporting Your Boss and Colleagues 00:04:00 Building a Partnership with Your Boss 00:13:00 Positioning Yourself as a Professional Attitude in the Workplace FREE 00:10:00 Professionalism 00:03:00 Making Changes through Personal Accountability 00:07:00 Enhancing Your Professional Image Your Image as a Whole 00:05:00 Becoming More Marketable 00:03:00 Communicating and Image 00:08:00 Expanding Your Skills Time Management 00:14:00 Project Management Techniques 00:03:00 Making Decisions 00:06:00 Communicating for Results Keys to Effective Communication 00:26:00 Presentations 00:09:00 Meetings 00:07:00 Building Relationships and Networks Work and Your Personality 00:05:00 Networking 00:07:00 Roles in the Office MRP 00:18:00 Principles of Professional Behavior What is Etiquette? FREE 00:05:00 Always Be Your Best 00:12:00 Always Be Your Best When Meeting and Greeting 00:06:00 Interview Etiquette Types of Interviews 00:07:00 Planning for the Interview 00:07:00 During the Interview 00:13:00 Planning and Attending Business Meetings Types of Meetings 00:06:00 Planning Conference Call Meetings 00:10:00 Meal Meetings 00:09:00 Electronic Etiquette Voicemail 00:08:00 Instant Messaging 00:09:00 Multicultural Etiquette Five Steps to Dealing with Diversity 00:13:00 Facing New Problems The Critical Thinking Process FREE 00:24:00 Group Dynamics 00:17:00 Critical Thinking Methods 00:04:00 Problem Solving Approaches 00:09:00 Establishing the Problem A Identify the Problem 00:08:00 Exploring the Problem 00:06:00 Discovering the Solution Assembling Potential Ideas 00:09:00 Determining the Best Solution 00:04:00 Evaluating Cost and Benefit 00:05:00 Building Your Case 00:02:00 Accepting a Decision Accepting a Decision 00:13:00 Identifying Goals Identifying Goals FREE 00:10:00 Effective Energy Distribution Energy Distribution 00:09:00 Time Logs 00:11:00 Working with Your Personal Style Personal World View 00:10:00 Strengths 00:09:00 Building Your Toolbox A Building Your Toolbox 00:10:00 Establishing Your Action Plan Establishing Your Action Plan 00:11:00 Preparing for the Strategic Planning Process Preparing for the Strategic Planning Process FREE 00:16:00 Establish a Committee 00:06:00 Gather Operational Data 00:13:00 Initiating the Strategic Planning Process Develop a Mission Statement 00:12:00 Develop a Vision Statement 00:06:00 Assess Internal and External Environments 00:12:00 Performing SWOT Analysis 00:08:00 Developing the Strategic Plan Prioritize What the Strategic Plan Will Address 00:03:00 Set Goals and Objective 00:07:00 Develop Strategy for Achieving Goals 00:02:00 Draft the Strategic Plan 00:09:00 Executing the Plan Assign Responsibility and Authority 00:10:00 Establish a Monitoring System 00:06:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Workplace Essentials Training - Complete Video Course
Delivered Online On Demand18 hours 3 minutes
£22

Python Programming: Beginner To Expert

By iStudy UK

Python Programming: Beginner To Expert Overview Unfold the potential within you, and embark on a journey of mastering Python programming - from the fundamental building blocks to the pinnacle of expertise. This comprehensive course, crafted with meticulous care, empowers you to transform from a curious novice to a confident coding maestro, wielding Python's power with finesse. Within these engaging modules, you'll delve into the core principles of Python, meticulously exploring data types, operators, control flow, and functions. As your proficiency blossoms, you'll conquer advanced topics like object-oriented programming, powerful libraries like NumPy and Pandas, and the art of crafting polished scripts. But this journey isn't merely about acquiring technical prowess; it's about unlocking a world of possibilities. By the course's end, you'll be equipped to embark on a rewarding career path, armed with the skills to tackle real-world challenges in diverse domains - from data analysis and web development to scientific computing and automation. Learning Outcomes Gain a solid foundation in Python syntax, data structures, and control flow mechanisms. Master essential functions, user input, and error-handling techniques. Explore advanced data types, object-oriented programming concepts, and popular libraries like NumPy and Pandas. Craft polished, reusable Python scripts for various applications. Confidently navigate the Python ecosystem and continuously expand your knowledge. Why You Should Choose Python Programming: Beginner To Expert Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Python Programming: Beginner To Expert is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Python Programming: Beginner To Expert is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Python Programming: Beginner To Expert Module 01: Introduction to Python Programming from A-Z Intro To Python Section Overview 00:06:00 What is Python Programming? 00:10:00 Who is This Course For? 00:05:00 Python Programming Marketplace 00:06:00 Python Job Opportunities 00:05:00 How To Land a Python Job Without a Degree 00:08:00 Python Programmer Job Roles 00:09:00 Python from A-Z Course Structure 00:04:00 Module 02: Getting Familiar with Python Getting Familiar with Python Section Overview 00:06:00 Installing Python on Windows 00:10:00 Anaconda and Jupyter Notebooks Part 1 00:08:00 Anaconda and Jupyter Notebooks Part 2 00:16:00 Comments 00:05:00 Python Syntax 00:02:00 Line Structure 00:03:00 Line Structure Exercise 00:07:00 Joining Lines 00:05:00 Multiple Statements on a Single Line 00:05:00 Indentation 00:08:00 Module 03: Basic Data Types Basic Data Types Section Overview 00:08:00 String Overview 00:10:00 String Manipulation 00:07:00 String Indexing 00:04:00 String Slicing 00:08:00 Printing 00:10:00 Python Variables 00:08:00 Integers and Floats 00:08:00 Booleans 00:02:00 Mini Project 1 : Letter Counter 00:20:00 Module 04: Python Operators Python Operators Section Overview 00:04:00 Comparison Operators 00:09:00 Arithmetic Operators 00:08:00 Assignment Operators 00:05:00 Logical Operators 00:13:00 Identity Operators 00:05:00 Membership Operators 00:02:00 Bitwise Operators 00:08:00 Module 05: Advanced Data Types Python Advanced Data Types Section Overview 00:11:00 Sets 00:06:00 List Overview 00:05:00 List Slicing and Indexing 00:04:00 Tuples 00:02:00 Dictionaries 00:11:00 When to use each one? 00:05:00 Compound Data Types 00:03:00 Module 06: Control Flow Part 1 Control Flow Part 1 Section Overview 00:15:00 Intro to Control Flow 00:01:00 Basic Conditional Statements 00:14:00 More Conditional Statements 00:05:00 For Loops 00:10:00 While Loops 00:12:00 Module 07: Control Flow Part 2 Control Flow Part 2 Section Overview 00:02:00 Break Statements 00:08:00 Continue Statements 00:05:00 Zip Function 00:07:00 Enumerate Function 00:04:00 List Comprehension 00:04:00 Module 08: Python Functions Python Functions Section Overview 00:03:00 Intro to Functions 00:02:00 Python help Function 00:03:00 Defining Functions 00:09:00 Variable Scope 00:08:00 Doc Strings 00:04:00 Module 09: User Input and Error Handling User Input and Error Handling Section Overview 00:02:00 Introduction to error handling 00:03:00 User Input 00:04:00 Syntax Errors 00:04:00 Exceptions 00:11:00 Handling Exceptions Part 1 00:08:00 Handling Exceptions Part 2 00:08:00 Module 10: Python Advanced Functions Python Advanced Functions Section Overview 00:05:00 Lambda Functions 00:05:00 Functions args and kwargs 00:10:00 Iterators 00:08:00 Generators and Yield 00:12:00 Map Function 00:14:00 Filter Function 00:08:00 Module 11: Python Scripting and Libraries Python Scripting and Libraries Section Overview 00:05:00 What is a script? 00:01:00 What is an IDE? 00:17:00 What is a text editor? 00:12:00 From Jupyter Notebook to VScode Part 1 00:15:00 From Jupyter Notebook to VScode Part 2 00:05:00 Importing Scripts 00:03:00 Standard Libraries 00:04:00 Third Party Libraries 00:06:00 Module 12: NumPy NumPy Section Overview 00:04:00 Why use NumPy? 00:04:00 NumPy Arrays 00:10:00 Reshaping, Accessing, and Modifying 00:07:00 Slicing and Copying 00:06:00 Inserting, Appending, and Deleting 00:10:00 Array Logical Indexing 00:04:00 Broadcasting 00:08:00 Module 13: Pandas Intro to Pandas 00:17:00 Pandas Series 00:17:00 Pandas Series Manipulation 00:17:00 Pandas DataFrame 00:17:00 Pandas DataFrame Manipulation 00:13:00 Dealing with Missing Values 00:10:00 Module 14: Introduction to OOP Functional vs OOP 00:06:00 OOP Key Definitions 00:04:00 Create your First Class 00:12:00 How to Create and Use Objects 00:06:00 How to Modify Attributes 00:12:00 Module 15: Advanced OOP Python Decorators 00:27:00 Property Decorator 00:09:00 Class Method Decorator 00:07:00 Static Methods 00:10:00 Inheritance from A to Z 00:21:00 Module 16: Starting a Career in Python Getting Started with Freelancing 00:09:00 Building A Brand 00:12:00 Personal Branding 00:13:00 Importance of Having Website/Blog 00:04:00 Do's and Don'ts of Networking 00:06:00 Creating A Python Developer Resume 00:06:00

Python Programming: Beginner To Expert
Delivered Online On Demand15 hours 8 minutes
£25

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry