The 'Learn the Art and Science of PCB Design with Eagle' course provides a comprehensive journey into the world of printed circuit board (PCB) design. PCBs are the backbone of modern electronics, and understanding how to design them is crucial for anyone interested in electronics and engineering. This course covers everything from the basics of software installation and library management to advanced techniques like double-sided PCB design and surface-mount technology (SMT) component integration. By the end of this course, you'll have the knowledge and skills to create your own PCBs for various electronic applications. In today's tech-driven world, the ability to design PCBs is a highly valuable skill. Whether you're an electronics hobbyist, a student, or a professional in the field, this course is designed to empower you with the essential skills required to bring your electronic ideas to life through PCB design. You'll gain the confidence to create custom PCBs for personal projects or even pursue a career in electronics engineering. Don't miss this opportunity to unlock the potential of PCB design and enhance your knowledge in this exciting field. Learning Outcomes Gain an understanding of PCB design principles and terminology. Install and set up Eagle software to create your first project. Learn how to create and manage libraries for schematic components. Master single-sided PCB design techniques for basic projects. Progress to designing more complex double-sided PCBs. Acquire knowledge of surface-mount technology (SMT) components. Develop the ability to create custom library components in Eagle. Explore the use of the Autorouter for efficient PCB routing. Efficiently copy frequently used parts into your component library. Understand the manufacturing process and guidelines for PCB production. Who is this course ideal for? Electronics enthusiasts and hobbyists looking to expand their skills. Students in engineering, electronics, or related fields. Professionals seeking to enhance their skill set or transition into electronics. Individuals interested in creating custom PCBs for personal projects. Anyone looking to explore the fascinating world of PCB design. Why Choose This Course Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Career Path PCB Design Engineer: £25,000 - £50,000 Electronics Engineer: £30,000 - £60,000 Embedded Systems Engineer: £35,000 - £70,000 Hardware Design Engineer: £30,000 - £55,000 Electronics Technician: £20,000 - £40,000 Prerequisites No prior qualifications or experience are necessary for this 'Learn the Art and Science of PCB Design with Eagle' course. It is designed to be accessible to individuals of all backgrounds. The course is compatible with various devices, including PCs, Macs, tablets, and smartphones, and can be accessed from anywhere with an adequate internet connection. Certification Upon successful completion of the course, you can take a written assignment test. After passing the test, you can obtain a PDF certificate for a fee of £4.99. If you prefer a physical certificate, hard copies can be ordered for an additional cost of £8. Course Curriculum Unit 01: Introduction Module 01: Introduction 00:01:00 Module 02: Basics of Printed Circuit Board (Important) 00:13:00 Unit 02: Software Installation and Creating First project Module 01: Eagle Software Installation 00:04:00 Module 02: Creating Project with Eagle 00:05:00 Unit 03: Library and Schematic Module 01: Creating Schematic with Eagle 00:09:00 Module 02: Eagle Installing External Libraries 00:06:00 Module 03: Update: Directly adding External Libraries online 00:03:00 Unit 04: Single Sided PCB Design Module 01: Create First Complete Schematic in Eagle 00:07:00 Module 02: First PCB Layout, the proper placement of component 00:05:00 Module 03: Create First Single Sided PCB with Eagle 00:07:00 Module 04: Adding Name and Labels to Eagle Schematics 00:06:00 Unit 05: Creating PCB Project Module 01: Microcontroller PCB Project with Eagle Part 1 00:06:00 Module 02: Microcontroller PCB Project with Eagle Part 2 00:09:00 Module 03: Microcontroller PCB Project with Eagle Part 3 00:05:00 Unit 06: Copper Pour Module 01: Adding Copper Pour to Eagle PCB 00:06:00 Unit 07: Double Sided PCB Design Module 01: Double Sided PCB Design with Eagle 00:05:00 Module 02: Double Sided PCB Design (Hands On) 00:09:00 Unit 08: All about SMT Components Module 01: Surface Mount Devices in Eagle 00:08:00 Module 02: SMT based Schematic (FTDI Project) 00:11:00 Module 03: SMT and Double Sided PCB Design 00:09:00 Unit 09: Create Custom Library Component in Eagle Module 01: Eagle Create Custom Library Part 1 00:14:00 Module 02: Eagle Create Custom Library Part 2 00:08:00 Module 03: Eagle Create Custom Library Part 3 00:07:00 Unit 10: Using Autorouter (Cheating the Software!!!) Module 01: Use Autorouter for single sided PCB 00:05:00 Module 02: Use Autorouter for Double sided PCB 00:01:00 Unit 11: Copy frequently required parts in your library Module 01: Copy frequently required parts in your library 00:03:00 Unit 12: Manufacturing Guide Module 01: Print a Single Sided PCB 00:05:00 Module 02: Gerber File Extraction 00:03:00 Module 03: Generate Bill of Materials 00:02:00 Unit 13: Solution Videos, added as per requests Module 01: PCB Artwork of Electronic Cricket Match Circuit 00:11:00 Unit 14: Ending Notes Module 01: Eagle Current Calculation 00:08:00 Module 02: Conclusion 00:01:00 Assignment Assignment - Learn the Art and Science of PCB Design with Eagle 00:00:00
SQL for Data Science, Data Analytics and Data Visualization Course Overview: This course offers a comprehensive introduction to SQL, designed for those looking to enhance their skills in data science, data analytics, and data visualisation. Learners will develop the ability to work with SQL databases, efficiently query and manage data, and apply these techniques for data analysis in both SQL Server and Azure Data Studio. By mastering SQL statements, aggregation, filtering, and advanced commands, learners will be equipped with the technical skills required to manage large datasets and extract meaningful insights. The course provides a solid foundation in data structures, user management, and working with multiple tables, culminating in the ability to perform complex data analysis and visualisation tasks. Course Description: This course covers a broad range of topics essential for anyone working with data in a professional capacity. From setting up SQL servers to mastering database management tools like SQL Server Management Studio (SSMS) and SQL Azure Data Studio, the course provides a thorough grounding in SQL. Learners will gain expertise in data structure statements, filtering data, and applying aggregate functions, as well as building complex SQL queries for data analysis. The course also includes instruction on SQL user management, group by statements, and JOINs for multi-table analysis. Key topics such as SQL constraints, views, stored procedures, and database backup and restore are also explored. The course incorporates SQL visualisation tools in Azure Data Studio, empowering learners to visualise data effectively. By the end of the course, learners will be proficient in SQL queries, data manipulation, and using Azure for data analysis. SQL for Data Science, Data Analytics and Data Visualization Curriculum: Module 01: Getting Started Module 02: SQL Server Setting Up Module 03: SQL Azure Data Studio Module 04: SQL Database Basic SSMS Module 05: SQL Statements for DATA Module 06: SQL Data Structure Statements Module 07: SQL User Management Module 08: SQL Statement Basic Module 09: Filtering Data Rows Module 10: Aggregate Functions Module 11: SQL Query Statements Module 12: SQL Group By Statement Module 13: JOINS for Multiple Table Data Analysis Module 14: SQL Constraints Module 15: Views Module 16: Advanced SQL Commands Module 17: SQL Stored Procedures Module 18: Azure Data Studio Visualisation Module 19: Azure Studio SQL for Data Analysis Module 20: Import & Export Data Module 21: Backup and Restore Database (See full curriculum) Who is this course for? Individuals seeking to enhance their data management and analysis skills. Professionals aiming to progress in data science, data analytics, or database administration. Beginners with an interest in data analysis and SQL databases. Anyone looking to gain expertise in SQL for Azure and SQL Server environments. Career Path: Data Analyst Data Scientist Database Administrator SQL Developer Business Intelligence Analyst Data Visualisation Specialist
Course Overview This Personal Assistant (PA) course is designed to provide learners with essential skills and knowledge to excel in a variety of administrative roles. Covering everything from business communication to organisational skills, this course ensures learners are equipped to manage office duties efficiently, support executives, and contribute to the smooth running of an organisation. By completing this course, learners will gain a solid understanding of the core functions of a PA, enabling them to confidently take on responsibilities in any professional setting. Course Description The course delves into key areas including business telephone etiquette, managing travel arrangements, organising meetings, and developing effective communication skills. Learners will explore the nuances of record-keeping, minute-taking, and scheduling, essential for ensuring a well-structured office environment. With a strong emphasis on time management, organisational skills, and business writing, this course prepares learners to confidently manage multiple tasks and responsibilities in fast-paced work environments. By the end, learners will have developed the ability to enhance productivity and support executive operations effectively. Course Modules Module 01: Introduction to Personal Assistant Module 02: Business Telephone Skills Module 03: Representing Your Boss and Company Module 04: Mail Services and Shipping Module 05: Travel Arrangements Module 06: Organising Meetings and Conferences Module 07: Time Management Module 08: Record Keeping and Filing Systems Module 09: Business Writing Skills Module 10: Organisational Skills Module 11: Communication Skills Module 12: Customer Service Module 13: Effective Planning and Scheduling Module 14: Invoicing/Petty Cash Module 15: Introduction to Minute Writing Module 16: Preparation for Minute Taking Module 17: The Meeting Structure Module 18: Minute Meeting, Decision and Action Module 19: Roles and Responsibility of Minute Taker Module 20: Tips for Minute Taking Module 21: Technology in Minute Taking Module 22: Building Confidence (See full curriculum) Who is this course for? Individuals seeking to enhance their administrative skills. Professionals aiming to advance their career as a Personal Assistant. Beginners with an interest in office management and administrative roles. Anyone interested in developing organisational and communication skills. Career Path Personal Assistant Executive Assistant Administrative Assistant Office Manager Office Administrator Executive Support Specialist
Course Overview The Xero Accounting and Bookkeeping Level 7 course offers a comprehensive understanding of digital accounting using Xero software, tailored for individuals looking to advance in financial management and bookkeeping roles. This course equips learners with essential knowledge to manage sales, purchases, payroll, VAT, and fixed assets efficiently. Learners will also explore how to maintain accurate financial records and ensure compliance with current UK regulations. Whether you are looking to upgrade your skills or step into a new career, this course supports your professional development by building competence in cloud-based accounting practices. Upon completion, learners will have the confidence to work in a variety of finance-related roles and contribute effectively to any business or organisation’s accounting functions. Course Description This course delves into core areas of Xero accounting, starting with an introduction to the software and progressing through key functionalities including sales invoicing, purchase management, bank reconciliation, and payroll processing. Learners will be guided through each section in a structured and accessible way, allowing them to understand how to set up and manage accounts, handle tax returns, and record transactions accurately. Additional topics such as fixed asset tracking and product/service management provide a complete view of digital bookkeeping in a professional context. The curriculum is designed to align with UK financial standards and includes a detailed exploration of VAT return procedures. By the end of the course, learners will develop a strong grasp of Xero’s interface, gain proficiency in managing financial tasks digitally, and enhance their confidence to support accounting operations within various business settings. Course Modules Module 01: Introduction Module 02: Getting Started Module 03: Invoices and Sales Module 04: Bills and Purchases Module 05: Bank Accounts Module 06: Products and Services Module 07: Fixed Assets Module 08: Payroll Module 09: VAT Returns (See full curriculum) Who is this course for? Individuals seeking to develop advanced accounting skills using cloud-based software. Professionals aiming to improve their bookkeeping knowledge and career progression. Beginners with an interest in digital finance and business accounting. Small business owners and administrative staff managing company accounts. Career Path Xero Bookkeeper Accounts Assistant Payroll Officer Finance Administrator VAT Compliance Officer Office Manager (with financial duties) Small Business Accountant
This course delves into the complex relationship between safeguarding practices and counseling techniques. It explores the causes and types of depression, as well as various treatment approaches including medication and complementary therapies. Discover how counseling plays a vital role in addressing depression, exploring different approaches, and offering additional study materials to deepen your knowledge. Learning Outcomes: Understand the underlying causes of depression. Identify and differentiate between various types of depression. Explore the range of medication options for depression treatment. Learn about complementary alternative therapies for managing depression. Examine counseling approaches tailored to addressing depression. Develop insights into the intersection of safeguarding and counseling. Gain practical knowledge to support individuals dealing with depression. Access additional study materials for comprehensive learning. Why buy this Safeguarding and Counselling? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Safeguarding and Counselling you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Safeguarding and Counselling course is ideal for Mental health professionals and counselors. Healthcare practitioners. Individuals interested in mental health and wellbeing. Students pursuing psychology or counseling studies. Prerequisites This Safeguarding and Counselling was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Licensed Professional Counselor - Average Earnings: $40,000 - $70,000 per year. Clinical Psychologist - Average Earnings: $60,000 - $120,000 per year. Mental Health Therapist - Average Earnings: $40,000 - $70,000 per year. Social Worker (Mental Health) - Average Earnings: $40,000 - $70,000 per year. Psychiatric Nurse Practitioner - Average Earnings: $100,000 - $150,000 per year. Course Curriculum Safeguarding and Counselling Course Module 01: Introduction to Safeguarding 00:21:00 Module 02: An Introduction to Safeguarding of Vulnerable Adults 00:30:00 Module 03: Laws and Guidance 00:43:00 Module 04: Safeguarding Legislations 00:30:00 Module 05: Understanding Abuse and Neglect 00:36:00 Module 06: Child Abuse 00:49:00 Module 07: Sexual Abuse 00:38:00 Module 08: Understanding the Importance of Communication in Care 00:30:00 Module 09: Sharing Information and Responding To a Disclosure 00:30:00 Module 10: Record Keeping 00:18:00 Module 11: Risks and Risk Assessment 00:16:00 What Causes Depression Introduction 00:05:00 Melancholy and the History of Counselling 00:07:00 Signs of Depression 00:07:00 Depression and the Brain 00:06:00 Depression and Neurons 00:09:00 Stress and depression 00:10:00 Environmental and Health Factors 00:04:00 Depression and Sleep Disorders 00:06:00 Somatic Symptoms 00:06:00 Risk Factors 00:07:00 Module 1: Assessment Questions 00:05:00 Different Types of Depression Classifying Depression & Different Classification Methods 00:07:00 Cyclothymia 00:06:00 Depression and Creative Minds 00:07:00 Dysthymia, Pre-Menstrual Dysphoric Disorder, and Atypical Depression 00:07:00 Bipolar / Manic Depression 00:06:00 Antenatal & Postpartum Depression 00:09:00 Bereavement and Grief 00:09:00 Dysthymia in Children and Adolescents 00:04:00 Depression and the Elderly 00:06:00 Psychosocial & Health Factors in the Elderly 00:03:00 Module 2: Assessment Questions 00:04:00 Different Types of Medicine Neurogenesis 00:04:00 Monoamine Oxidase Inhibitors 00:04:00 Serotonin Syndrome 00:03:00 Selective Serotonin Reuptake Inhibitors 00:03:00 Tyramine 00:03:00 Medication Statistics and Doctors in the UK & USA 00:10:00 Module 3: Assessment Questions 00:03:00 Complementary Alternative Therapies Lifestyle management, Diet, Exercise, Meditation 00:07:00 St John's Wort (hypericum perforatum) 00:05:00 Omega 3 Fatty Acids 00:04:00 Tai chi, Qigong 00:04:00 Yoga 00:04:00 Acupuncture 00:03:00 Art Therapy & Music Therapy 00:08:00 Module 4 Assessment Questions 00:04:00 Counselling Approaches to Depression Person Centred Therapy 00:07:00 Family or Couples Therapy 00:09:00 Stepped Care Model (approach) 00:10:00 Psychodynamic/Dynamic Interpersonal Therapy 00:06:00 Rational Emotive Behavioural Therapy 00:06:00 Clinical Hypnotherapy & Cognitive Behavioural Therapy 00:05:00 Clinical Hypnotherapy for Post Traumatic Stress Disorder 00:05:00 Gestalt Therapy 00:06:00 The Therapeutic Relationship 00:07:00 Knowledge and Qualities Necessary to a Counsellor 00:03:00 Module 5 assessment questions 00:03:00 Thank You and Good Bye! 00:03:00 Additional Study Materials Additional Study Materials: Safeguarding and Counselling 00:00:00
Overview Delegation Skills Course is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Delegation Skills Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Section 01: Introduction Welcome to Your Course 00:03:00 Delegation or Allocation: What is Delegation? 00:04:00 Reverse Delegation: How your Team ends-up Delegating to You 00:05:00 Section 02: Why People in Your Role find it Hard to Delegate Why do You find it Hard to Delegate? 00:02:00 The Excuses People Give for not Delegating? 00:04:00 How Would You Counter Excuses for not Delegating to you? 00:01:00 Responding to Excuses for not Delegating 00:09:00 Section 03: What and When to Delegate Mental Blocks to Delegate 00:07:00 What are the Poor Reasons for Delegating? 00:01:00 Poor Reasons for Delegating 00:05:00 What are the good reasons to delegate? 00:01:00 Positive Reasons to delegate 00:03:00 What Should You Not Delegate? 00:01:00 The Jobs You Should Keep for Yourself 00:04:00 Section 04: How to Delegate What is Your Delegation Process? 00:01:00 The Key Elements of a Delegation Process 00:02:00 The Five-step Delegation Process 00:05:00 Preparing to Delegate 00:06:00 The Principles of Setting-up Your Delegation 00:04:00 The Practice of Setting-up Your Delegation 00:05:00 The Principles of Locking-down Your Delegation 00:03:00 The Five Levels of Delegation 00:05:00 The Jiminy Cricket Effect 00:04:00 Overseeing the Delegation 00:05:00 Closing-out the Delegation 00:03:00 How to Offer Feedback (Part 1) 00:06:00 How to Offer Feedback (Part 2) 00:06:00 Positive Feedback, or Negative Feedback? 00:03:00 Section 05: Closing Section Four Attitudes for Good Delegation 00:04:00 Reflection on your Skills Development 00:01:00 Goodbye and Good Luck 00:02:00 Bonus Lecture: If you liked this course 00:02:00 Assignment Assignment - Delegation Skills 00:00:00
Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00
Highlights of the Course Course Type: Online Learning Duration: 8 hours 13 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about forensic investigation Understand the core competencies and principles of forensic investigation Explore the various areas of forensic investigation Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert pentester Cyber Security and Digital Forensics for Pentesters - Hands-on Course Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification. Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of CSI Linux 2021.2 00:12:00 Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Video and lab - Create a Virtual Install Kali Image Using VirtualBox 00:11:00 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox 00:10:00 Using Kali Forensic Mode and Autopsy Video and Lab -Getting Started with Autopsy 00:10:00 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Video and Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Video and Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source Intelligence (OSINT) Video and Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Video and Lab - Find Social Media Accounts Using Sherlock 00:07:00 Video - OSINT Framework - Overview 00:16:00 Using Shodan to Search for Vulnerable Devices Video and Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Video and lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Computer Forensics Video - Attaching an External USB Device in Kali 00:07:00 Video and Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Video and Lab - Analyzing the Windows Registry for Evidence 00:14:00 Video and Lab - Dumping Wi-Fi Credentials Using netsh 00:04:00 Video and Lab - Email Header Analysis 00:17:00 Video and Lab - Using Shellbags to View Hidden or Deleted Folders 00:06:00 Video and Lab - Extracting Thumbnail Images From a Suspects Machine 00:05:00 Video and lab - Memory Forensics Using the Volatility Framework 00:19:00 Reverse Engineering and Malware Analysis Video and Lab - Install Ghidra on CSI Linux 00:07:00 Video and Lab - Introduction to Using Ghidra 00:14:00 Video and Lab - Reverse Engineering crackme0x00 Using Ghidra 00:06:00 Video and Lab - Reverse Engineering crackme0x05 Using Ghidra 00:12:00 Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra 00:17:00 Malware Hunting with Sysinternal Tools Video - Overview of Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:00:00 Video and Lab - Finding Malware with Sysinternals Process Explorer 00:09:00 Stenography Video and Lab - Using Steghide for Hiding and Extracting Data 00:11:00 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network Forensics Using Wireshark Video - Overview of Wireshark 3.2 00:11:00 Video - Wireshark Capture Options 00:07:00 Video - Wireshark Toolbar Icons 00:03:00 Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Video - Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Learned Video and Lab - CTF Lab Build for HA: Forensics 00:11:00 Video and lab - Capture flag #1 00:12:00 Video and lab - Capture flag #2 00:10:00 Video and lab - Capture flag #3 00:20:00 Video and lab - Capture flag #4 00:09:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?