• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

163 Encryption courses in Bradford delivered On Demand

Introduction to Website Development Technologies

By Packt

This comprehensive, hands-on course empowers beginners with essential web development skills. From HTML, CSS, and JavaScript to GitHub and Bootstrap, master the tools of the trade. Learn to build, style, and deploy websites effortlessly. No prior knowledge of programming or web development is needed.

Introduction to Website Development Technologies
Delivered Online On Demand8 hours 27 minutes
£14.99

Computer Programming Training - CPD Certified

4.9(27)

By Apex Learning

*** Don't Spend More; Spend Smart*** Life Just Got Better This Summer! Get Hard Copy + PDF Certificates + Transcript + Student ID Card + e-Learning App as a Gift - Enrol Now Tired of browsing and searching for the perfect computer programming course? Struggling to find a comprehensive package that covers all your needs? Look no further! The Computer Programming Training - CPD Certified offers a complete 14-in-1 bundle, providing everything you need to excel in computer programming and related fields. This extensive course is designed to equip you with the essential skills and knowledge to thrive in today’s competitive job market. This all-in-one computer programming bundle has been meticulously crafted by industry experts, taking into account feedback from thousands of learners just like you. We have prioritised the key components that learners seek in a comprehensive computer programming package and developed a course that addresses these needs effectively. From fundamental computer science principles to advanced programming techniques, this bundle ensures you gain a well-rounded education. Enrol in the Computer Programming Training - CPD Certified today and take your computer programming skills to the next level. With this course, you'll enhance your expertise and prepare yourself for success in the dynamic world of technology. Don’t miss out on the opportunity to advance your career with a certification that stands out. This Bundle Consists of the following Premium courses: Course 01: Python Programming for Everybody Course 02: Computer Science With Python Course 03: Data Science with Python Course 04: JavaScript Foundations for Everyone Course 05: C # Programming - Beginner to Advanced Course 06: R Programming for Data Science Course 07: Three.js & WebGL 3D Programming Course for Beginners Course 08: SQL Programming Masterclass Course 09: SQL NoSQL Big Data and Hadoop Course 10: Nodejs MySQL Login System Course Course 11: Coding with HTML, CSS, & Javascript Course 12: HTML and CSS Coding: Beginner to Advanced Course 13: CSS Coding Course 14: Functional Skills IT Key Features of the Course: FREE Computer Programming Training – CPD Certified certificate Get a free student ID card with Computer Programming Training – CPD Certified (£10 applicable for international delivery) Lifetime access to the Computer Programming Training – CPD Certified course materials The Computer Programming Training – CPD Certified program comes with 24/7 tutor support Get instant access to this Computer Programming Training – CPD Certified course Learn Computer Programming Training – CPD Certified from anywhere in the world The Computer Programming Training – CPD Certified is affordable and simple to understand The Computer Programming Training – CPD Certified is entirely online Learning Outcomes: Upon completing the Computer Programming Training - CPD Certified, you will: Master core computer programming concepts and methodologies. Develop proficiency in Python, HTML, CSS, JavaScript, and PHP. Implement and manage cloud computing solutions with CompTIA Cloud+. Apply ethical hacking techniques and enhance cybersecurity knowledge with Kali Linux. Design and manage databases using SQL Server and understand data encryption principles. Build and customise your own computer systems to meet specific needs. How will I get my Certificate? After successfully completing the course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (For The Title Course) Hard Copy Certificate: Free (For The Title Course) CPD 160 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Computer Programming Training - CPD Certified bundle. Requirements Our Computer Programming Training - CPD Certified bundle is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path With the Computer Programming Training - CPD Certified, you open doors to a variety of rewarding roles in the tech industry. Explore these career opportunities: Junior Developer: £25,000 - £35,000 Web Developer: £30,000 - £45,000 Software Engineer: £35,000 - £55,000 Full Stack Developer: £40,000 - £60,000 Cybersecurity Analyst: £35,000 - £50,000 Cloud Solutions Architect: £50,000 - £70,000 Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included P.S. The delivery charge inside the UK is £3.99, and the international students have to pay £9.99.

Computer Programming Training  - CPD Certified
Delivered Online On Demand3 days
£79

The Complete Ethical Hacking Course

By Packt

If you are a newbie in the field of ethical hacking or want to become an ethical hacker, this course is just what will get you started. This is a comprehensive course with real-world examples to help you understand the fundamentals of hacking and cyber security.

The Complete Ethical Hacking Course
Delivered Online On Demand35 hours 54 minutes
£29.99

CompTIA Security+

4.5(3)

By Studyhub UK

Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.  The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. Learning Outcomes Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. Acquire proficiency in various cryptographic methods and their importance in securing data. Gain insights into effective identity and account management to enhance system security. Learn to utilize essential security tools for safeguarding individual and network systems. Master the skills to implement and manage security measures for both wired and wireless networks. Why buy this CompTIA Security+? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aiming to start a career in cybersecurity. IT professionals seeking to deepen their knowledge in network security. System administrators wanting to enhance their security skills. Students interested in acquiring a foundational understanding of cybersecurity principles. Professionals aiming to achieve the CompTIA Security+ certification for career advancement. Prerequisites This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Cybersecurity Analyst: £30,000 - £60,000 annually Information Security Manager: £40,000 - £75,000 annually Network Security Engineer: £35,000 - £65,000 annually Security Consultant: £35,000 - £70,000 annually Systems Administrator (with security specialization): £25,000 - £50,000 annually IT Security Coordinator: £28,000 - £55,000 annually Course Curriculum Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00

CompTIA Security+
Delivered Online On Demand19 hours 23 minutes
£10.99

Electronic Document Management: Secure and Accessible File Storage

4.3(43)

By John Academy

Unlock the secrets of efficient Electronic Document Management (EDM) with our comprehensive course on Secure and Accessible File Storage. Delve into industry standards, regulations, and compliance, master the implementation and framework of EDM systems, and explore advanced topics such as AI integration. Elevate your skills in document lifecycle management, operations, and security auditing. Join us to gain the expertise needed for seamless digital transformation and effective information management in today's dynamic business environment.

Electronic Document Management: Secure and Accessible File Storage
Delivered Online On Demand
£24.99

Cisco CCNA 200-301: The Complete Guide to Getting Certified

By Packt

In this practical course, you will learn to develop a complete understanding of all the concepts and topics you need to master in order to achieve the most sought-after networking certification today. With its easy-to-understand, structured approach, this course will enable you to master Cisco networking to the CCNA level, and beyond, in no time.

Cisco CCNA 200-301: The Complete Guide to Getting Certified
Delivered Online On Demand37 hours 44 minutes
£14.99

AJAX Next Level (Authentication, Servers, Modules, Projects, and More)

By Packt

It doesn't matter where you are in your web development journey, and you will benefit if you have at least a little knowledge of AJAX. If you have an interest in advancing in AJAX, getting better in the world of full-stack programming, and knowing how you can use AJAX in a practical way to perform CRUD operations-then this course is for you.

AJAX Next Level (Authentication, Servers, Modules, Projects, and More)
Delivered Online On Demand15 hours 45 minutes
£41.99

Cyber Security Training With Complete Career Guide Course

5.0(2)

By Training Express

In today’s fast-paced digital world, cyber security is no longer just a luxury—it’s a necessity. With data breaches and cyber threats on the rise, organisations across the globe are looking for experts who can safeguard their systems and sensitive information. Our Cyber Security Training with Complete Career Guide Course offers you the chance to develop a deep understanding of the vital elements of cyber security. From network protection to threat management, you’ll explore the key concepts that keep the cyber world secure. This course is designed to give you the knowledge to build a solid foundation in cyber security, preparing you for the ever-growing demands of the industry. Through a structured and engaging curriculum, you’ll gain a firm grasp on essential topics like risk assessment, encryption, firewalls, and data protection. By the end of this course, you’ll have a strong knowledge base to pursue a rewarding career in cyber security. Whether you’re a beginner or looking to enhance your skills, this course ensures you can confidently step into a field that’s vital to businesses worldwide. Get ready to dive into a dynamic industry with plenty of opportunities to grow and develop your career—no matter where you’re starting from. ________________________________________________________________________ Key Features: CPD Certified Cyber Security Training With Complete Career Guide 10 Instant e-certificate and hard copy dispatch by next working day Fully online, interactive course with audio voiceover Developed by qualified professionals in the field Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum: Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Module 05: Threats to Cyber Security by Criminals and Organised Crimes Module 06: Threats to Cybersecurity by Hacktivists and Nation-States Module 07: Cyberterrorism Module 08: An Evolving Threat: The Deep Web Module 09: Fraud Module 10: Jurisdiction ________________________________________________________________________ Complete Career Guide for Cyber Security Training (A to Z) This isn't just a course; it's your ticket to thriving in the sector and your roadmap to the Cyber Security. In addition to mastering the essentials of Cyber Security, you'll also gain valuable skills in CV writing, job searching, communication, leadership, and project management. These 9 complementary courses are designed to empower you at every stage of your journey. Stand out in your career, from crafting a winning CV to excelling in interviews. Develop the leadership skills to inspire your team and efficiently manage projects. This holistic approach ensures you're not just job-ready but career-ready. Enrol today, and let's build your success story together in Cyber Security. Your dream career starts here! List of career guide courses included in Cyber Security Training With Complete Career Guide: Course 01: Professional CV Writing and Job Searching Course 02: Communication Skills Training Course 03: Career Development Training Course 04: Time Management Course 05: Returning to Work Training Course 06: Level 3 Diploma in Project Management Course 07: Leadership Skills Course 08: Body Language Course 09: Interview and Recruitment ________________________________________________________________________ Learning Outcomes: Understand the foundations of Cyber Law and its applications. Analyze the intersection of Cyber Law, Ethics, and Online Gambling. Comprehend the dynamics of Cyber Crime, Security, and Trust. Identify the various threats targeting computers and cyberspace. Evaluate the role of different entities, such as criminals and nation-states. Explore advanced topics like Cyberterrorism, the Deep Web, and Jurisdiction. ________________________________________________________________________ Accreditation All of our courses, including the Cyber Security Training With Complete Career Guide, are fully accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed your Cyber Security Training With Complete Career Guide, you will immediately be sent your digital certificates. Also, you can have your printed certificate delivered by post (shipping cost £3.99). Our certifications have no expiry dates, although we recommend renewing them every 12 months. Assessment At the end of the courses, there will be an online assessment, which you will need to pass to complete the course. Answers are marked instantly and automatically, allowing you to know straight away whether you have passed. If you haven't, there's no limit on the number of times you can take the final exam. All this is included in the one-time fee you paid for the course itself. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals seeking a comprehensive understanding of Cyber Law. Professionals in online industries concerned with ethics and legality. Law enforcement personnel aiming to combat cyber threats effectively. IT specialists and security professionals enhancing their knowledge. Students pursuing legal or cybersecurity-related disciplines. Career path Cybersecurity Analyst - £40K to 60K/year. Digital Forensic Analyst - £35K to 50K/year. IT Security Consultant - £45K to 70K/year. Cybercrime Investigator - £35K to 55K/year. Legal Consultant in Cyber Law - £40K to 65K/year. Certificates 10 CPD Accredited e-Certificates Digital certificate - Included 10 CPD Accredited Hard Copy Certificates Hard copy certificate - Included

Cyber Security Training With Complete Career Guide Course
Delivered Online On Demand1 hour
£50

AWS Certified Solutions Architect Associate (SAA-C03)

By Packt

Prepare for the AWS Certified Solutions Architect - Associate (SAA-C03) exam. Learn about the AWS Management Console, S3 buckets, instances, database services, cloud security, costs associated with AWS, Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS).

AWS Certified Solutions Architect Associate (SAA-C03)
Delivered Online On Demand23 hours 24 minutes
£261.99

Ruby on Rails 5 - Become a Professional Developer

4.9(27)

By Apex Learning

Overview This comprehensive course on Ruby on Rails 5 - Become a Professional Developer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ruby on Rails 5 - Become a Professional Developer comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ruby on Rails 5 - Become a Professional Developer. It is available to all students, of all academic backgrounds. Requirements Our Ruby on Rails 5 - Become a Professional Developer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 23 sections • 225 lectures • 16:47:00 total length •Course Introduction: 00:06:00 •The Application We're Going to Build: 00:09:00 •Section Introduction gg: 00:01:00 •Introduction to the Command Line Interface in Mac and Linux: 00:10:00 •Installing the X-Code Command Line Tools for Mac: 00:02:00 •Installing Git for Source Code Version Control: 00:03:00 •How to install Homebrew on a Mac: 00:04:00 •Installing GPG Security Systems on a Mac: 00:02:00 •Guide to RVM for Ruby Management: 00:09:00 •Configuring RubyGems and Installing Rails: 00:07:00 •Installing the Postgres Database on a Mac: 00:05:00 •Installing and Working with the Sublime Text Editor: 00:17:00 •Deep Dive into the Command Line - Part 1 of 2: 00:14:00 •Deep Dive into the Command Line - Part 2 of 2: 00:12:00 •PC Environment Setup: Installing Virtual Box: 00:03:00 •Guide to Installing Ubuntu Linux in VirtualBox: 00:10:00 •How to Reboot a Linux Virtual Machine from Terminal: 00:02:00 •Installing Desktop Applications and Ubuntu Navigation Tips and Tricks: 00:09:00 •How to Sign Up for a GitHub Account: 00:03:00 •How to install Git on Linux and Connect to GitHub via SSH: 00:20:00 •How to Securely Install Node and NPM on Linux via NVM: 00:09:00 •Installing the Heroku CLI and the Full Deployment Lifecycle: 00:14:00 •How to install and Work with Sublime Text in Linux: 00:08:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 1 of 2: 00:10:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 2 of 2: 00:15:00 •Fixing the Role Does Not Exist Error: 00:05:00 •Section Introduction ee: 00:01:00 •Signing Up for a Project Management Account: 00:03:00 •Managing the Project Management Dashboard: 00:08:00 •Importing Project Management Tasks into Pivotal Tracker: 00:01:00 •Creating a Rails Application: 00:11:00 •Generating a Blog for the Portfolio Application Using Rails Scaffolds: 00:11:00 •Analyzing the Rails Process: Index and Show Actions: 00:12:00 •Analyzing the Rails Process: New, Create, Update, Edit, and Destroy Actions: 00:14:00 •Analyzing the Rails Process: Routing with Resources: 00:07:00 •Rails File System Overview: 00:13:00 •Updating the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing the Application Generator - Part 1: 00:12:00 •Deep Dive: Analyzing the Application Generator - Part 2: 00:17:00 •Section Introduction bb: 00:02:00 •How to Sign Up for a Github Account: 00:03:00 •Generating SSH Keys to Securely Communicate with Github: 00:04:00 •Guide to GitHub: 00:12:00 •How to Update a .gitignore File to Securely Store Secret Credentials: 00:11:00 •Guide to the Markdown Syntax: 00:10:00 •Updating the Git Sprint in the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing Version Control and Git - Part 1: 00:18:00 •Deep Dive: Analyzing Version Control and Git - Part 2: 00:13:00 •Section Introduction aa: 00:01:00 •Guide to the Rails Controller Generator to Build Pages Part 1: 00:16:00 •Guide to the Rails Controller Generator to Build Pages Part 2: 00:05:00 •Guide to the Rails Model Generator to Build out Data Specific Features: 00:17:00 •Guide to the Rails Model Generator for Building Out the Portfolio Feature: 00:10:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 1: 00:15:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 2: 00:11:00 •Section Introduction SS: 00:02:00 •Building out a Seeds File for Generating Dynamic Sample Data: 00:15:00 •Implement an Index Action from Scratch in Rails: 00:12:00 •Build the New and Create Functionality from Scratch in Rails: 00:20:00 •Implement the Ability to Edit Database Records from Scratch in Rails: 00:13:00 •How to Use the Link to Method in Rails for Creating Dynamic Links: 00:13:00 •How to Implement the Show Action from Scratch in Rails: 00:12:00 •Building the Ability to Delete Items in Rails: 00:15:00 •How to Implement Custom Routes for Pages in Rails: 00:09:00 •How to Override the Rails Resources Routes for the Show Action: 00:07:00 •How to Implement Permalinks in a Rails Application - Part 1: 00:17:00 •How to Implement Permalinks in a Rails Application - Part 2: 00:05:00 •How to Use Enums in Rails to Manage Data Stages: 00:13:00 •How to Implement a Custom Action in Rails via a Button Click - Part 1: 00:12:00 •How to Implement a Custom Action in Rails via a Button Click - Part 2: 00:10:00 •Updating the Project Management Dashboard and Performing a Pull Request: 00:05:00 •Deep Dive: Rails Routing and Data Flow - Part 1: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 2: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 3: 00:16:00 •Section Introduction RR: 00:01:00 •Implementing Data Validations in Rails 5: 00:12:00 •Guide to Data Relationships in Rails: 00:16:00 •How to Implement Custom Scopes in Rails 5: 00:16:00 •How to Set Default Values in Rails 5: 00:13:00 •How to Use Concerns in Rails 5: 00:13:00 •Building an Additional Parent/Child Relationship in Rails 5: 00:10:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Model: 00:17:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Form: 00:17:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 1: 00:16:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 2: 00:14:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 3: 00:15:00 •Section Introduction QQ: 00:01:00 •How to Install Devise in Rails 5: 00:08:00 •Using Devise to Implement Registrations and Login Functionality: 00:18:00 •Building Custom Routes for Authentication Pages with Devise in Rails 5: 00:03:00 •Enable Users to Logout and Dynamically Render View Content in Rails 5: 00:07:00 •How to Add Custom Attributes to a Devise Based Authentication System: 00:15:00 •How to Use Controller Concerns in Rails 5 for Devise Custom Attributes: 00:15:00 •Integrate Virtual Attributes to Extract First and Last Name Data from a User: 00:17:00 •Deep Dive: Using BCrypt to Implement Encryption in Ruby: 00:19:00 •Section Introduction PP: 00:01:00 •Rails Data Flow Review and Working with Params: 00:14:00 •Using Rails Sessions to Share Data between Pages: 00:19:00 •Refactoring the Session Tracker into a Controller Concern: 00:07:00 •Working with Strong Params in a Rails 5 Controller: 00:13:00 •Deep Dive: Building a Guest User Feature in Rails - Part 1: 00:14:00 •Deep Dive: Building a Guest User Feature in Rails - Part 2: 00:18:00 •Section Introduction OO: 00:03:00 •How to Customize the Rails Master Layout File - Part 1: 00:15:00 •How to Customize the Rails Master Layout File - Part 2: 00:09:00 •Guide to Using Multiple Layout Files in Rails 5: 00:14:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Introduction to Partials in Rails 5: 00:08:00 •How to Send Data to Partials to Generate Custom Behavior in Rails 5: 00:15:00 •Guide to View Helpers in Rails 5: 00:17:00 •How to Use the Rails Content Tag Helper to Auto Generate HTML Code: 00:15:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Guide to Manually Configuring Partials to Work with Collections in Rails: 00:07:00 •Guide to Helpful ActionView Helper Methods in Rails 5: 00:15:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 1: 00:12:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 2: 00:15:00 •Section Introduction NN: 00:01:00 •How to Utilize Puts Debugging in Rails: 00:08:00 •Guide to Byebug in Rails 5: 00:09:00 •Guide to Debugging with Pry in Rails 5: 00:19:00 •Proper Way to Implement Error Management in a Rails Application - Part 1: 00:15:00 •Proper Way to Implement Error Management in a Rails Application - Part 2: 00:06:00 •Section Introduction MM: 00:01:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 1: 00:10:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 2: 00:12:00 •Section Strategy for Building a Custom RubyGem: 00:11:00 •How to Build a RubyGem from Scratch - Part 1: 00:06:00 •How to Build a RubyGem from Scratch - Part 2: 00:15:00 •Section Introduction hh: 00:02:00 •Introduction to Authorization and How to Install the Petergate Gem: 00:08:00 •How to Add Roles to the User Model in Rails 5: 00:05:00 •Guide to Implementing Petergate in Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Petergate in Rails 5 Application - Part 2: 00:12:00 •Workplace Facilities: 00:35:00 •Portfolio Design Planning for Layout Specific Styles: 00:09:00 •Implementing the Initial Homepage Design in Rails 5 with Bootstrap 4: 00:09:00 •Building a Navigation Partial for the Master Application Layout with Bootstrap: 00:11:00 •Implement a Footer Along with Adding Method Arguments to a Rails View Helper: 00:14:00 •How to Embed a Google Map into a Rails Application: 00:06:00 •Guide to Updating the Styles for the Devise Edit Account Page in Rails: 00:16:00 •How to Override Default Bootstrap Styles for Text Alignment in the Card Class: 00:06:00 •Implementing Styles for the Devise Registration Page with Bootstrap 4: 00:14:00 •How to Design the Login and Password Pages with Bootstrap 4 Form Styles: 00:15:00 •How to Set Default Values for View Helper Method Arguments in Rails 5: 00:04:00 •Integrating a Different Design for a Separate Blog Layout in Rails 5: 00:04:00 •How to Use Bootstrap 4 to Add a Custom Nav Bar to a Blog Layout in Rails: 00:07:00 •Customizing the Design for the Blog Index Page with Bootstrap 4: 00:19:00 •Guide to Adding Styles to the Blog Show and Form Pages with Bootstrap 4: 00:12:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 1: 00:23:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 2: 00:23:00 •Initial Design for the Portfolio Index Page with Bootstrap 4: 00:17:00 •Integrating the Portfolio Animated Navigation Slider, Footer, and Index: 00:14:00 •Using the Bootstrap 4 Grid Layout to Style the Portfolio Show Page in Rails: 00:06:00 •Implementing Bootstrap 4 Forms for the Portfolio Form Pages: 00:13:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 1: 00:20:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 2: 00:19:00 •Deep Dive: Rails Asset Pipeline Part 1: 00:01:00 •Deep Dive: Rails Asset Pipeline Part 2: 00:19:00 •Section Introduction LL: 00:01:00 •How to Integrate a Position Attribute and Custom Scope in Rails: 00:12:00 •Installing the jQuery UI and html5sortable JavaScript Libraries in Rails 5: 00:09:00 •Initial Implementation of Drag and Drop Interface in Rails 5: 00:13:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 1: 00:18:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 2: 00:11:00 •Implementing Authorization Rules for Drag and Drop Feature with Petergate: 00:07:00 •Deep Dive: jQuery CoffeeScript in Rails: 00:19:00 •Section Introduction jj: 00:01:00 •Introduction to Using Images and the Rails Asset Pipeline: 00:12:00 •How to Set a Full Size Video Background in Rails with Bootstrap 4: 00:08:00 •Deep Dive: Installing and Configuring Carrierwave for Image Uploads in Rails 5: 00:20:00 •Deep Dive: Integrating Connection to AWS S3 for File Hosting with Carrierwave: 00:14:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 1: 00:06:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 2: 00:19:00 •Section Introduction ii: 00:01:00 •Difference Between form_form and form_tag in Rails - Part 1: 00:15:00 •Difference Between form_form and form_tag in Rails - Part 2: 00:16:00 •How to Integrate Cocoon in Rails 5 for jQuery Nested Forms: 00:20:00 •Guide to Integrating Alerts that Automatically Fade Away in Rails 5: 00:15:00 •Refactoring Alert Notifications to Use a Shared View Helper in Rails: 00:13:00 •Deep Dive: How to Build an HTML Form from Scratch the Works with Rails: 00:17:00 •Section Introduction ff: 00:03:00 •Integrating the Twitter Gem to Pull in Tweets in Rails 5: 00:20:00 •How to Render Tweets on a Rails View Page: 00:07:00 •Building a Parser View Helper Method to Make Twitter Links Clickable in Rails: 00:15:00 •Customizing the Styles for the Tech News Page with Bootstrap 4: 00:07:00 •Section Introduction cc: 00:01:00 •Running the Comment Generator and Installing the NoSQL Redis Database in Rails 5: 00:18:00 •Building the Comment Form and Required Controller Actions - Part 1: 00:14:00 •Building the Comment Form and Required Controller Actions - Part 2: 00:08:00 •Refactoring the Comment Form into a Partial and Implementing Data Validations: 00:05:00 •Building the jQuery Functions for Processing Comments - Part 1: 00:19:00 •Building the jQuery Functions for Processing Comments - Part 2: 00:05:00 •How to Create a Broadcast with ActionCable in Rails 5: 00:14:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 2: 00:06:00 •Styling the Comment Section and Implementing Gravatar Based Thumbnails in Rails: 00:16:00 •Section Introduction dd: 00:01:00 •Planning Final Project Updates and Assignment: 00:11:00 •Building a Scope to Show the Most Recent Blog Posts and Hiding Draft Posts: 00:09:00 •Hiding the Show Page for Blogs in Draft Mode in Rails 5: 00:04:00 •How to Add a Drop Down Form Element in Rails 5 for Parent/Child Relationships: 00:09:00 •Using the Controller Generator to Build the Topic Features - Part 1: 00:10:00 •Using the Controller Generator to Build the Topic Features - Part 2: 00:11:00 •How to Build a Widget for the Blog to Render Topics in Rails 5: 00:17:00 •How to Implement Radio Buttons in a Rails Form to Update Enum Values: 00:09:00 •Guide to Integrating Markdown and Syntax Highlighting in a Rails 5 Application: 00:13:00 •Integrating Breadcrumbs and Icons for the Blog Show Pages: 00:12:00 •Building a Partial for Managing Admin Actions for Blog Posts: 00:15:00 •How to Implement a Responsive Navigation Bar with Bootstrap 4: 00:11:00 •Updating the Source/Session Tracking System for the New Layouts: 00:14:00 •How to Integrate a Favicon in Rails 5: 00:08:00 •Implementing Responsive Image Components for the Portfolio Layout: 00:06:00 •Adding Card Styles to the About and Contact Pages: 00:09:00 •How to Implement Collapsable Content Components in a Rails 5 Application: 00:09:00 •How to Integrate Bootstrap Progress Bars in a Rails Application: 00:13:00 •How to Integrate Custom Fonts in a Rails 5 Application: 00:17:00 •Updating the Seeds File in Rails: 00:07:00 •Signing Up for and Creating a New Heroku Application: 00:04:00 •How to Deploy a Rails 5 Application to Heroku: 00:13:00 •Working with the Rails Console on Heroku: 00:11:00 •Installing Redis on Heroku for ActionCable Commenting Feature: 00:04:00 •Configuring Action Cable to Work on Heroku: 00:11:00 •How to Implement the Typed.js Library into a Rails 5 Application: 00:12:00 •How to Install and Configure Webpack, Yarn, and jQuery into a Rails 5.1+ App: 00:19:00 •How to Work with Encrypted Credentials in Rails 5.2+: 00:24:00

Ruby on Rails 5 - Become a Professional Developer
Delivered Online On Demand16 hours 47 minutes
£12