• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26305 Courses delivered Online

Symmetrical Components for Three Phase Power Analysis

By NextGen Learning

Symmetrical Components for Three Phase Power Analysis Course Overview This course on Symmetrical Components for Three Phase Power Analysis provides a comprehensive introduction to a fundamental technique used in electrical power engineering. Learners will explore how symmetrical components simplify the analysis of unbalanced three-phase power systems, enhancing their ability to diagnose and solve complex electrical faults. The course offers clear explanations of key concepts such as positive, negative, and zero sequence components, as well as the mathematical tools required to apply them effectively. By completing this course, participants will gain valuable skills that improve their understanding of power system behaviour, enabling more accurate system design, fault analysis, and operational decision-making. This knowledge is essential for engineers, technicians, and students engaged in power system analysis and maintenance. Course Description This detailed course delves into the principles and applications of symmetrical components within three-phase power systems. Starting with an introduction to the historical background and theoretical framework, learners will examine the mathematical derivation and significance of symmetrical components. Key topics include the definition and roles of the positive, negative, and zero sequence components, the “a” operator used in transformations, and the synthesis equations that enable conversion between phase and sequence quantities. The course also emphasises problem-solving techniques through a variety of illustrative examples, fostering a thorough understanding of how symmetrical components aid in analysing unbalanced loads and fault conditions. Learners will develop the ability to interpret and manage three-phase system data with greater precision, a crucial skill for careers in electrical engineering and power system operation. Symmetrical Components for Three Phase Power Analysis Curriculum: Module 01: Introduction Module 02: Symmetrical Components Overview Module 03: The Components Module 04: The “a” Operator Module 05: Working with the a Operator Module 06: Synthesis Equations Module 07: Problems & Solutions (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of three-phase power systems. Professionals aiming to advance their expertise in electrical power engineering. Beginners with an interest in electrical engineering and power system analysis. Engineering students preparing for careers in power distribution and fault analysis. Career Path Electrical Power Engineer Power System Analyst Electrical Design Engineer Maintenance Engineer in Power Utilities Technical Specialist in Energy Sector

Symmetrical Components for Three Phase Power Analysis
Delivered OnlineFlexible Dates
£7.99

Emergency Care Worker

By Course Cloud

Our Emergency Care Worker course is designed to prepare you for these crucial roles. From the basics to advanced skills, we cover it all.

Emergency Care Worker
Delivered Online On Demand1 hour 29 minutes
£5.99

Overview of Housing Officer Join our Housing Officer course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Housing Officer course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Housing Officer course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This Housing Officer Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Housing Officer. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Housing Officer course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Housing Officer is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Housing Officer course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Housing Officer Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Frequently Asked Questions (FAQ's) Q. How do I purchase a course? 1. You need to find the right course on our IOMH website at first. You can search for any course or find the course from the Courses section of our website. 2. Click on Take This Course button, and you will be directed to the Cart page. 3. You can update the course quantity and also remove any unwanted items in the CART and after that click on the Checkout option and enter your billing details. 4. Once the payment is made, you will receive an email with the login credentials, and you can start learning after logging into the portal. Q. I have purchased the course when will I be able to access the materials? After purchasing the course, you should receive an email with the login credentials within 24 hours. Please check your spam or junk folder if you didn't receive it in your inbox. You can access your courses by logging into your account. If you still need any assistance, please get in touch with our Customer Support team by providing the details of your purchase. Q. I haven't received my certificate yet. What should I do? You should receive your Digital Certificate within 24 hours after placing the order, and it will take 3-9 days to deliver the hard copies to your address if you are in the UK. For International Delivery, it will take 20-25 days. If you require any assistance, get in touch with our dedicated Customer Support team, and your queries/issues will be dealt with accordingly. Q. I don't have a credit/debit card, what other methods of payment do you accept? You can make the payment using PayPal or you can Bank Transfer the amount. For Bank transfer you will require an invoice from us and you need to contact our Customer Support team and provide details of your purchase to get the invoice. After that, you will receive an email with the invoice and bank details and you can make the payment accordingly. Q. Can I do the courses from outside UK? We are an online course provider, and learners from anywhere in the world can enrol on our courses using an internet-connected device. Q. When I log into the account it says 'Contact Administrator'. To resolve this issue, please log out of your account and then log back in. Course Curriculum Housing Officer Training Module 1: Introduction to Social Housing 00:15:00 Module 2: Career Prospects of Social Housing Manager 00:25:00 Module 3: Tenant Selection and Tenant Management 00:28:00 Module 4: Managing Rental Income and Arrears 00:24:00 Module 5: Time Management 00:37:00 Module 6: Organisational Skills 00:27:00 Module 7: Communication Skills 00:27:00 Module 8: Negotiation Techniques 00:19:00 Module 9: Dealing with Anti-Social Behaviours 00:39:00 Module 10: Stress Management 00:19:00 Module 11: Maintenance, Safety, and Security of Social Housing 00:32:00 Module 12: Resident Involvement in Social Housing 00:31:00

Housing Officer
Delivered Online On Demand5 hours 23 minutes
£11.99

Ethical Hacking with Kali Linux

4.9(27)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

CompTIA Security+ (SY0-601)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

Computer Science With Python

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Science With Python will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Science With Python comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Science With Python. It is available to all students, of all academic backgrounds. Requirements Our Computer Science With Python is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 152 lectures • 04:54:00 total length •Introduction: 00:03:00 •Quiz 1: 00:02:00 •Quiz 1 Solution: 00:01:00 •What is Programming: 00:03:00 •Quiz 2: 00:01:00 •Quiz 2 Solution: 00:01:00 •Meeting the interpreter and Problem Quiz 3: 00:01:00 •Quiz 3 solution: 00:01:00 •Congratulations: 00:01:00 •Why programming and Quiz 4: 00:02:00 •Quiz 4 Solution: 00:03:00 •Grammar and Python Rules: 00:04:00 •Backus Naur Form: 00:03:00 •Quiz 4 part 2: 00:01:00 •Quiz 4 part 2 Solution: 00:01:00 •Python Grammar and Quiz 5: 00:05:00 •Quiz 5 Solution: 00:03:00 •Quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Processors: 00:02:00 •Introducing Variables: 00:05:00 •Variables Quiz 7: 00:02:00 •Variables Can Vary: 00:03:00 •Variables Quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Variables Quiz 9: 00:01:00 •Quiz 9 Solution: 00:01:00 •Variables Quiz 10: 00:01:00 •Quiz 10 Solution: 00:03:00 •Introducing Strings: 00:04:00 •Using Strings Quiz 11: 00:01:00 •Quiz 11 Solution: 00:03:00 •Strings and Numbers - String Concatenation Quiz Solution: 00:03:00 •String indexing: 00:02:00 •Quiz 13: 00:01:00 •Quiz 13 Solution: 00:03:00 •String subsequences: 00:04:00 •String subsequences quiz 14: 00:01:00 •Quiz 14 solution: 00:02:00 •Understanding selection quiz 15: 00:01:00 •Quiz 15 solution: 00:04:00 •Finding string in string quiz 16: 00:04:00 •Quiz 16 solution: 00:02:00 •Testing and quiz 17: 00:02:00 •Quiz 17 solution: 00:03:00 •Find With Parameter Quiz 18: 00:02:00 •Quiz 18 solution: 00:01:00 •Extracting links from a web page Quiz 19: 00:03:00 •Extracting links from a web page Quiz 19 Solution: 00:02:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Congratulations: 00:01:00 •Unit Overview: 00:03:00 •Procedural Abstraction: 00:03:00 •Introducing Procedures: 00:04:00 •Procedure code quiz 1: 00:04:00 •Quiz 1 Solution: 00:01:00 •Output and quiz 2: 00:01:00 •Quiz 2 Solution: 00:02:00 •Return Statement and Quiz 3: 00:03:00 •Quiz 3 solution: 00:02:00 •Inc Procedure Quiz 4: 00:01:00 •Quiz 4 Solution: 00:01:00 •Sum Procedure and Quiz 5: 00:01:00 •Quiz 5 Solution: 00:02:00 •Sum procedure with a return statement: 00:02:00 •Square procedure quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Sum 3 Quiz 7: 00:01:00 •Quiz 7 Solution: 00:02:00 •Double string procedure quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Find second quiz 9: 00:02:00 •Quiz 9 Solution: 00:02:00 •Equality Comparison Quiz 10: 00:04:00 •Quiz 10 Solution: 00:01:00 •If statement quiz 11: 00:03:00 •Quiz 11 Solution: 00:03:00 •Is friend quiz 12: 00:02:00 •Quiz 12 solution: 00:02:00 •Is friend quiz 13: 00:02:00 •Quiz 13 Solution: 00:02:00 •The Or construct: 00:03:00 •Quiz 14 solution: 00:06:00 •While loop quiz 15: 00:05:00 •Quiz 15 solution: 00:03:00 •While loop quiz 16: 00:01:00 •Quiz 16 solution: 00:02:00 •Print numbers quiz 17: 00:01:00 •Quiz 17 solution: 00:02:00 •Factorial quiz 18: 00:02:00 •Quiz 18 solution: 00:02:00 •Break quiz 19: 00:04:00 •Quiz 19 solution: 00:03:00 •Quiz 20: 00:05:00 •Quiz 20 Solution: 00:01:00 •No links quiz 21: 00:01:00 •Print all links quiz 21 solution: 00:03:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Unit Overview: 00:03:00 •Stooges and quiz 1: 00:01:00 •Quiz 1 Solution: 00:01:00 •Countries quiz: 00:01:00 •Quiz 3 solution: 00:01:00 •Relative Size Quiz: 00:01:00 •Quiz 4 Solution: 00:01:00 •Lists Mutation: 00:01:00 •Different Stooges quiz: 00:01:00 •Quiz 5 Solution: 00:01:00 •Secret Agent Man Quiz: 00:01:00 •Replace Spy Quiz: 00:01:00 •Quiz 7 Solution: 00:03:00 •Python List Addition and Length: 00:02:00 •List Operations In Python: 00:02:00 •Python lists length quiz: 00:01:00 •Quiz 8 Solution: 00:01:00 •Append Quiz: 00:01:00 •Hard drive quiz: 00:01:00 •Quiz 11 Solution: 00:01:00 •Python Loops on Lists Quiz: 00:02:00 •Quiz 12 solution: 00:02:00 •Python For loops: 00:03:00 •Sum List Quiz: 00:01:00 •Measure a String Quiz: 00:01:00 •Find Element Quiz: 00:02:00 •Quiz 15 solution: 00:04:00 •Quiz 16 solution: 00:01:00 •Python Union Procedure Quiz: 00:01:00 •Quiz 17 solution: 00:01:00 •Pop in Python Quiz 18: 00:02:00 •Quiz 18 solution: 00:03:00 •Collecting Links: 00:01:00 •Get All Links: 00:02:00 •Starting Get All Links Quiz: 00:01:00 •Quiz 19 solution: 00:01:00 •Updating Links Quiz: 00:01:00 •Quiz 20 Solution: 00:01:00 •Finishing Get All Links Quiz: 00:01:00 •Quiz 21 Solution: 00:01:00 •Finishing the Python Web Crawler: 00:03:00 •Crawling Process Quiz: 00:01:00 •Quiz 22 Solution: 00:01:00 •Crawl Web Quiz: 00:01:00 •Quiz 23 Solution: 00:01:00 •Crawl Web Loop Quiz: 00:01:00 •Quiz 24 Solution: 00:02:00 •Crawl If Quiz: 00:01:00 •Quiz 25 Solution: 00:01:00 •Finishing Crawl Web and Final Quiz: 00:02:00 •Final Quiz Solution & Conclusion: 00:03:00 •Assignment - Computer Science With Python: 00:00:00

Computer Science With Python
Delivered Online On Demand4 hours 54 minutes
£12

Criminal Intelligence Analyst

4.7(160)

By Janets

Criminal Intelligence Analysts decode patterns, trends, and data to uncover insights crucial for law enforcement. They employ analytical prowess to aid investigations, identify criminal networks, and enhance public safety. Discover the role's significance and methodologies in crime prevention and resolution.

Criminal Intelligence Analyst
Delivered Online On Demand14 days
£9.99

Diploma in Medical Secretary

4.7(160)

By Janets

Discover the Diploma in Medical Secretary program, equipping you with essential administrative skills tailored for the healthcare industry. Learn medical terminology, office management, and specialized communication techniques for a rewarding career as a valued medical secretary.

Diploma in Medical Secretary
Delivered Online On Demand14 days
£9.99

Employment Law For HR Managers

4.7(160)

By Janets

Navigate the complex landscape of employment law with confidence. Our comprehensive course on Employment Law for HR Managers equips you with the knowledge and skills to effectively manage legal challenges in the workplace. Stay compliant, mitigate risks, and empower your HR team with expert insights on key regulations and best practices. Elevate your expertise and safeguard your organization's success with our essential training for HR professionals.

Employment Law For HR Managers
Delivered Online On Demand4 weeks
£9.99

Exotic Animal Care Level 3

4.7(160)

By Janets

Explore advanced techniques in Exotic Animal Care with our Level 3 course. Gain in-depth knowledge of veterinary practices, nutrition, and specialized care for a variety of exotic species. Elevate your skills and become a sought-after professional in the field of exotic animal health. Enroll now for a comprehensive and hands-on learning experience.

Exotic Animal Care Level 3
Delivered Online On Demand3 weeks
£9.99