• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1416 Courses delivered Online

Complete Visual BASIC

5.0(3)

By Systems & Network Training

Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.

Complete Visual BASIC
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in Internationally or OnlineFlexible Dates
£4,997

Objective-C programming

5.0(3)

By Systems & Network Training

Objective-C programming training course description A hands on introduction that will allow you to master Objective-C and start using it to write powerful native applications for even the newest Macs and iOS devices! Using The step-by-step approach, will let you get comfortable with Objective-C's unique capabilities and Apple's Xcode 5 development environment. Make the most of Objective-C objects and messaging. Work effectively with design patterns, collections, blocks, foundation classes, threading, Git and a whole lot more. Every session builds on what you've already learned, giving a rock-solid foundation for real-world success! What will you learn Use Xcode 5. Declare classes, instance variables, properties, methods, and actions. Use arrays, dictionaries, and sets. Expand and extend classes with protocols, delegates, categories, and extensions. Use Apple's powerful classes and frameworks. Objective-C programming training course details Who will benefit: Developers wanting to learn Objective-C. Prerequisites: Software development fundamentals. Duration 5 days Objective-C programming training course contents PART 1: GETTING STARTED WITH OBJECTIVE-C The Developer Program: Objective-C, enrolling as an Apple Developer, setting up the development environment, Xcode. Your first project. OO programming with Objective-C: OO projects, Frameworks, classes and instances, encapsulation, accessors, Inheritance. OO features in Objective-C: Messages, methods, working with id, nesting messages, method signatures and parameters. allocating and initializing objects. Using Xcode: Xcode, source code control, git and Xcode, Using a Remote Repository. Compiler Directives: Projects, Compiler Directives, Prefix headers, main.m, .h files. PART 2: OBJECTIVE-C BASICS Messaging in a Testbed App: Setting Up the Testbed Apps, Adding a Text Field and Connecting It to Your Code, Sending a Message to the Text Field, Reviewing the Message Syntax. Declaring a Class in an Interface File: Context, Creating an Instance Variable with id, What Happens When Execution Stops, dynamic binding, Creating an Instance Variable for with the Class Name and with a Superclass Name, instance variable visibility. Properties in an Interface File: Interface Variables vs Properties, Declared Properties, Using Attributes. Implementing Properties. @synthesize, @dynamic. Methods in an Interface File: Methods in a Class, class and instance methods, Method declaration, returning complex data structures from Methods. Actions in an Interface File: Actions, Actions in OS X and iOS, disconnecting actions. Routing messages with selectors: Receiver and selector objects in messages, Objective-C Runtime, SEL and @selector (), performSelector, NSInvocation, testing whether an Instance can respond to a selector. Building on the Foundation: The Foundation Framework, Foundation Classes, Foundation Paradigms and Policies; Mutability, class clusters, notifications. Defining a Class in Implementation Files: Projects, dynamic typing, creating a new App, implementing a method, expanding Classses with init Methods. Organizing Data with Collections: Collecting Objects, Property Lists, Runtime, comparing the Collection Classes, Creating a Collection, Objective-C Literal Syntax, Enumerating collections, Testing Membership in a Collection, Accessing an Object in a Collection. Managing Memory and Runtime Objects: Managing objects in memory, managing reference counts manually and with ARC, variable qualifiers, variable autorelease. PART 3: EXPANDING AND EXTENDING CLASSES Protocols and Delegates: Subclassing, Protocols, Delegates, Looking Deeper Inside Protocols. Categories and Extensions: Comparing categories and protocols, categories vs subclasses, working with categories, class extensions, informal protocols. Associative References and Fast Enumeration: Objective-C 2.0 Time-Saving Features, Extending Classes by Adding Instance Variables (Sort of), Using Fast Enumeration. Blocks: Revisiting Blocks, Callbacks, Blocks, Exploring Blocks in Cocoa, Cocoa Blocks and Memory. PART 4: BEYOND THE BASICS Handling Exceptions and Errors: Exception and Error classes: NSException, NSError, Identifying exceptions, throwing exceptions, catching exceptions. Queues and Threading: Getting Started with Concurrency, Introducing Queues, Dispatch Sources, Using Dispatch Queues. Working with the Debugger: Logging Information, Console Logs, NSLog, Smart Breakpoints, enhancing breakpoints with messages. Using Xcode Debug Gauges for Analysis: Debug Gauges, Monitoing CPU and memory utilization, monitoring energy, Using Instruments. PART 5: OPTIONAL TOPICS C Syntax Summary: Data Types, Control Structures. Apps, Packages, and Bundles: Project Bundles, lproj Files, Asset Catalogs, plist Files, Precompiled Header Files (.pch). Archiving and Packaging Apps for Development and Testing: Archiving.

Objective-C programming
Delivered in Internationally or OnlineFlexible Dates
£4,997

Enterprise Firewall (NSE 7)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the administration and support of a security infrastructure using FortiGate appliances. Overview Monitor traffic passing through FortiGate Optimize FortiGate memory usage Diagnose using FortiGate tools such as the built-in sniffer and ''diagnose debug flow'' command Monitor statistics for user traffic, traffic shaping, user authentication, IPsec, web proxy, BGP, OSPF and HA Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, user authentication, *IPsec, FortiGuard, UTM inspection, explicit web proxy, routing, and HA Describe the processing flow of FortiGate packet inspection Configure FortiGate for external BGP and OSPF This 3-day class provides more in-depth work with FortiGate infrastructure and architecture, combined with enhanced troubleshooting methods and tools to isolate and fix the most common issues in networks with FortiGate devices. Module 1: Security Fabric Configuring the Security Fabric Troubleshooting: Security Fabric Physical and logical topology views Module 2: FortiOS Architecture System information Module 3: System Troubleshooting Crash Logs Module 4: Traffic and Session Monitoring Exploring the session table Troubleshooting: Connectivity issues Module 5: Routing Failover of existing sessions Troubleshooting: Routing Module 6: FortiGuard Troubleshooting: Local FDS issue Troubleshooting: Rating lookups Module 7: Central Management FortiManager and registration Module 8: OSPF Configuring OSPF Troubleshooting: OSPF Module 9: Web Filtering and Antivirus Configuring Web Filtering and AV Troubleshooting: Web Filetering Troubleshooting: Antivirus Module 10: IPS Configuring IPS IPS custom signatures Module 11: BGP Configuring BGP Troubleshooting: BGHP neighbor Troubleshooting: BGP routing Configuring prefix lists Module 12: IPsec Troubleshooting: IPsec VPN Manager Module 13: Auto Discovery VPN Configuring ADVPN and IBGP Troubleshooting: OSPF and BGP' Additional course details: Nexus Humans Enterprise Firewall (NSE 7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Firewall (NSE 7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Enterprise Firewall (NSE 7)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Ethical Hacking - Complete Video Training

4.3(43)

By John Academy

Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Ethical Hacking - Complete Video Training
Delivered Online On Demand14 hours 5 minutes
£24

CompTIA Training - CPD Accredited

4.7(26)

By Academy for Health and Fitness

>> 12-Hour Knowledge Knockdown! Prices Reduced Like Never Before << Do you know the UK's cyber security threat landscape? In 2023 alone, businesses faced over 1.5 million cyber attacks, costing an estimated £29 billion. With cybercrime on the rise, there's a growing demand for skilled cybersecurity professionals. Feeling vulnerable? What if you could be part of the solution, protecting vital data and infrastructure? This CompTIA Training Bundle Package includes: Course 01: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 02: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 03: Advanced Diploma in Cyber Security at QLS Level 7 Course 04: IT: Ethical Hacking & IT Security This CompTIA Training bundle equips you with the knowledge and skills to become a cybersecurity expert. You'll master ethical hacking, cloud computing, and web development, preparing you for globally recognised certifications. With our CompTIA Training gain practical skills to protect data and systems, boost your career, and contribute to a safer digital future. Learning Outcomes of CompTIA Training Develop comprehensive knowledge and skills for the CompTIA CySA+ certification. Master ethical hacking principles and techniques for identifying vulnerabilities. Gain in-depth understanding of IT security best practices and threat mitigation strategies. Learn to navigate the complexities of cloud computing with CompTIA Cloud+. Enhance your expertise in cloud data security and infrastructure optimisation. Develop the ability to detect and respond to cyber threats effectively. Don't wait for your future to be hacked! Take control of your career with this powerful CompTIA Training bundle. Enrol today in our CompTIA Training and unlock your potential in a field with endless possibilities! Why Choose Our CompTIA Training Bundle? Get a Free CPD Certified Certificate upon completion of CompTIA Training Get a free student ID card with CompTIA Training Get instant access to this CompTIA Training course. The CompTIA Training is affordable and simple to understand Lifetime access to the CompTIA Training course materials The CompTIA Training comes with 24/7 tutor support Start your learning journey straightaway! *** Course Curriculum *** Course 01: Cloud Computing / CompTIA Cloud+ (CV0-002) Section 01: What You Need To Know Section 02: Introducing The Cloud Section 03: System Requirements For Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating To The Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Course 02: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Section 01: Introduction Section 02: The Importance Of Threat Data And Intelligence Section 03: Threat Intelligence In Support Of Organizational Security Section 04: Vulnerability Assessment Tools Section 05: Threats And Vulnerabilities Associated With Specialized Technology Section 06: Threats And Vulnerabilities Associated With Specialized Technology Section 07: Threats And Vulnerabilities Associated With Operating In The Cloud Section 08: Mitigating Controls For Attacks And Software Vulnerabilities Section 09: Security Solutions For Infrastructure Management Section 10: Software Assurance Best Practices and much more... Course 03: Advanced Diploma in Cyber Security at QLS Level 7 Module 01: Introduction To Cyber Law Module 02: Cyber Law, Cyber Ethics And Online Gambling Module 03: Cyber Crime, Cyber Security And Trust In Cyberspace Module 04: Threat Factors: Computer As A Target Module 05: Threats To Cyber Security By Criminals And Organised Crimes Module 06: Threats To Cybersecurity By Hacktivists And Nation-States Module 07: Cyberterrorism Module 08: An Evolving Threat: The Deep Web Module 09: Fraud Module 10: Jurisdiction Course 04: IT: Ethical Hacking & IT Security Introduction To Ethical Hacking Reconnaissance - Surveying The Attack Surface Scanning And Enumeration - Getting Down To Business Network Presence Attacking Web Hacking Social Engineering - Hacking Humans How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*4 = £51) CPD Hard Copy Certificate: Free ( For The Title Course: Previously it was £29.99) CPD 230 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this course. This bundle is ideal for: IT Professionals Career Changers Security Enthusiasts Students Requirements You will not need any prior background or expertise in this CompTIA Training bundle. Career path This CompTIA Training bundle will allow you to kickstart or take your career in the related sector to the next stage. Security Analyst IT Auditor Penetration Tester Cloud Security Specialist Security Consultant Certificates CPD Accredited Digital Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this bundle as proof of your new skills that are accredited by CPD QS for Free. CPD Accredited Hard Copy Certificate Hard copy certificate - Included Please note that International students have to pay an additional £10 as a shipment fee.

CompTIA Training - CPD Accredited
Delivered Online On Demand25 hours
£30

Cyberpunk - Photoshop Compositing

By Course Cloud

The comprehensive Cyberpunk - Photoshop Compositing has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Cyberpunk - Photoshop Compositing today, and learn from the very best the industry has to offer! This best selling Cyberpunk - Photoshop Compositing has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Cyberpunk - Photoshop Compositing is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Cyberpunk - Photoshop Compositing is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Cyberpunk - Photoshop Compositing is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Cyberpunk - Photoshop Compositing , you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Cyberpunk - Photoshop Compositing will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Cyberpunk - Photoshop Compositing to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Cyberpunk - Photoshop Compositing
Delivered Online On Demand
£25

Hacked Credit and Debit Card Recovery

By Course Cloud

Course Overview Credit and debit card fraud is on the rise, and hackers are finding new and more intelligent ways to extract personal financial information.  The Hacked Credit and Debit Card Recovery course is designed to teach learners how to prevent information leakage and protect their personal information against threat hackers and actors. It will teach you everything you need to know about credit, debit card and banking fraud, introducing fundamental cyber security best practices.  This course will also teach you how to use the Threat Ninja tool to rescue hacked credit and debit cards. By the end of this training, you will have an excellent understanding of how credit and debit card information is leaked, and will be fully familiar with the essential information handling procedures.  This best selling Hacked Credit and Debit Card Recovery has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Hacked Credit and Debit Card Recovery is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Hacked Credit and Debit Card Recovery is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Hacked Credit and Debit Card Recovery is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Hacked Credit and Debit Card Recovery, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Hacked Credit and Debit Card Recovery will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Hacked Credit and Debit Card Recovery to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Hacked Credit and Debit Card Recovery
Delivered Online On Demand
£25

Principles of Information & Digital Technology

4.8(9)

By Skill Up

Step into the ever-evolving digital tech world, where programming and cyber safety intermingle, guiding you towards mastery of information technology principles.

Principles of Information & Digital Technology
Delivered Online On Demand1 hour 41 minutes
£25

Mikrotik Network Management with LABS

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Mikrotik Network Management with LABS
Delivered Online On Demand2 hours 59 minutes
£25