• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3920 Engineer courses in Ince-in-Makerfield delivered Online

Power Electronics for Electrical Engineering

By IOMH - Institute of Mental Health

Overview This Power Electronics for Electrical Engineering course will unlock your full potential and will show you how to excel in a career in Power Electronics for Electrical Engineering. So upskill now and reach your full potential. Everything you need to get started in Power Electronics for Electrical Engineering is available in this course. Learning and progressing are the hallmarks of personal development. This Power Electronics for Electrical Engineering will quickly teach you the must-have skills needed to start in the relevant industry. In This Power Electronics for Electrical Engineering Course, You Will: Learn strategies to boost your workplace efficiency. Hone your Power Electronics for Electrical Engineering skills to help you advance your career. Acquire a comprehensive understanding of various Power Electronics for Electrical Engineering topics and tips from industry experts. Learn in-demand Power Electronics for Electrical Engineering skills that are in high demand among UK employers, which will help you to kickstart your career. This Power Electronics for Electrical Engineering course covers everything you must know to stand against the tough competition in the Power Electronics for Electrical Engineering field.  The future is truly yours to seize with this Power Electronics for Electrical Engineering. Enrol today and complete the course to achieve a Power Electronics for Electrical Engineering certificate that can change your professional career forever. Additional Perks of Buying a Course From Institute of Mental Health Study online - whenever and wherever you want. One-to-one support from a dedicated tutor throughout your course. Certificate immediately upon course completion 100% Money back guarantee Exclusive discounts on your next course purchase from Institute of Mental Health Enrolling in the Power Electronics for Electrical Engineering course can assist you in getting into your desired career quicker than you ever imagined. So without further ado, start now. Process of Evaluation After studying the Power Electronics for Electrical Engineering course, your skills and knowledge will be tested with a MCQ exam or assignment. You must get a score of 60% to pass the test and get your certificate.  Certificate of Achievement Upon successfully completing the Power Electronics for Electrical Engineering course, you will get your CPD accredited digital certificate immediately. And you can also claim the hardcopy certificate completely free of charge. All you have to do is pay a shipping charge of just £3.99. Who Is This Course for? This Power Electronics for Electrical Engineering is suitable for anyone aspiring to start a career in Power Electronics for Electrical Engineering; even if you are new to this and have no prior knowledge on Power Electronics for Electrical Engineering, this course is going to be very easy for you to understand.  And if you are already working in the Power Electronics for Electrical Engineering field, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  Taking this Power Electronics for Electrical Engineering course is a win-win for you in all aspects.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements This Power Electronics for Electrical Engineering course has no prerequisite.  You don't need any educational qualification or experience to enrol in the Power Electronics for Electrical Engineering course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online Power Electronics for Electrical Engineering course. Moreover, this course allows you to learn at your own pace while developing transferable and marketable skills. Course Curriculum Unit 1- Introduction to Power Electronics Components Module 1- Introduction to Power Electronics 00:13:00 Module 2- Uncontrolled Switches 00:17:00 Module 3- What is the Benefit of Diode 00:06:00 Module 4- Semi-Controlled Switches Part 1 00:09:00 Module 5- Semi-Controlled Switches Part 2 00:14:00 Module 6- Semi-Controlled Switches Part 3 00:05:00 Module 7- What is the Benefit of Thyristor 00:05:00 Module 8- Fully Controlled Switches Part 1 00:17:00 Module 9- Fully Controlled Switches Part 2 00:10:00 Module 10- Fully Controlled Switches Part 3 00:12:00 Unit 2- Fundamentals of Rectifier Circuits Module 1- Overview on Rectifiers 00:02:00 Module 2- Rectifier Definition 00:01:00 Module 3- Half Wave Uncontrolled Rectifier with R Load 00:21:00 Module 4- Example on Half Wave Uncontrolled Rectifier with R Load Part 1 00:06:00 Module 5- Example on Half Wave Uncontrolled Rectifier with R Load Part 2 00:07:00 Module 6- Half Wave Uncontrolled Rectifier with RL Load 00:10:00 Module 7- Derivation of the Discontinuous Current in R-L Load 00:08:00 Module 8- Freewheeling Diode (Commutation Diode) 00:03:00 Module 9- Half Wave R-L Load with FWD 00:09:00 Module 10- Difference Between Continuous and Discontinuous Mode in RL Load 00:07:00 Module 11- Half Wave RL Load with FWD Continuous Mode 00:06:00 Module 12- Example on Half Wave Rectifier with FWD 00:07:00 Module 13- Bridge Full Wave Uncontrolled Rectifier Part 1 00:07:00 Module 14- Bridge Full Wave Uncontrolled Rectifier Part 2 00:05:00 Module 15- Quick Revision on Bridge Full Wave Uncontrolled Rectifier 00:06:00 Module 16- Firing Angle 00:02:00 Module 17- Half Wave Controlled Rectifier R Load 00:05:00 Module 18- Half Wave Controlled Rectifier R-L Load 00:04:00 Module 19- Half Controlled R-L Load with FWD 00:06:00 Module 20- Example 1 00:07:00 Module 21- Example 2 00:08:00 Module 22- Example 3 00:13:00 Module 23- Example 4 00:09:00 Module 24- Example 5 00:05:00 Module 25- Fully Controlled Bridge Rectifier Part 1 00:06:00 Module 26- Fully Controlled Bridge Rectifier Part 2 00:06:00 Module 27- Quick Revision on Bridge Full Wave Controlled Rectifier 00:02:00 Module 28- Example 6 00:08:00 Module 29- Half Controlled Bridge Rectifier 00:08:00 Module 30- Half Controlled Bridge Rectifier with FWD 00:05:00 Module 31- Example 7 00:06:00 Module 32- Example 8 00:07:00 Module 33- Performance Parameters 00:04:00 Module 34- Power Factor 00:04:00 Unit 3- Fundamentals of AC Choppers Module 1- Introduction to AC Choppers 00:02:00 Module 2- Definition of AC Choppers 00:05:00 Module 3- Switching Techniques in AC Choppers 00:06:00 Module 4- Applications on AC Choppers 00:03:00 Module 5- Types of AC Choppers 00:02:00 Module 6- AC Chopper with R Load 00:14:00 Module 7- Example 1 on AC Chopper with R Load 00:06:00 Module 8- Example 2 on AC Chopper with R Load 00:04:00 Module 9- AC Chopper with L Load Part 1 00:13:00 Module 10- AC Chopper with L Load Part 2 00:06:00 Module 11- Example on AC Chopper with L Load 00:08:00 Module 12- AC Chopper with RL Series Load 00:20:00 Module 13- Example on AC Chopper with RL Series Load 00:07:00 Module 14- AC Chopper with RL Parallel Load 00:25:00 Module 15- Example on AC Chopper with RL Parallel Load 00:06:00 Module 16- AC Chopper with Pure Capacitive Load 00:14:00 Module 17- Example on AC Chopper with Pure Capacitive Load 00:04:00 Module 18- AC Chopper Loaded by Heavy Rectifier 00:06:00 Module 19- AC Chopper Loaded by an AC Motor with Sinusoidal Back Emf 00:12:00 Module 20- Example on AC Chopper Loaded by an AC Motor with Sinusoidal Back Emf 00:08:00 Module 21- Integral Cycle Control 00:11:00 Module 22- Example on Integral Cycle Control 00:04:00 Unit 4- Fundamentals of DC Choppers Module 1- Introduction to DC Choppers 00:02:00 Module 2- Definition and Application of DC Choppers 00:05:00 Module 3- Step down DC Chopper with R Load 00:12:00 Module 4- Example on Step Dwon DC Chopper with R Load 00:08:00 Module 5- Generation of Duty Cycle 00:09:00 Module 6- Switching Techniques 00:03:00 Module 7- Step Down DC Chopper with RLE Load Part 1 00:19:00 Module 8- Step Down DC Chopper with RLE Load Part 2 00:15:00 Module 9- Example 1 on Step Down DC Chopper with RLE Load 00:13:00 Module 10- Example 2 on Step Down DC Chopper with RLE Load 00:02:00 Module 11- Step Up DC Chopper with R or RL Load 00:09:00 Module 12- Step Up DC Chopper with RE Load 00:15:00 Module 13- Example on Step Up DC Chopper with RE Load 00:20:00 Module 14- Buck Regulator Part 1 00:16:00 Module 15- Buck Regulator Part 2 00:17:00 Module 16- Example on Buck Regulator 00:03:00 Module 17- Boost Regulator 00:23:00 Module 18- Example on Boost Regulator 00:06:00 Module 19- Buck Boost Converter 00:17:00 Module 20- Example on Buck-Boost Converter 00:05:00 Unit 5- Fundamentals of Inverters Module 1- Introduction to Inverters 00:02:00 Module 2- Definition of Inverters 00:04:00 Module 3- Importance and Applications of Inverters 00:08:00 Module 4- Single Phase Half Bridge R-Load 00:15:00 Module 5- Single Phase Half Bridge RL- Load 00:08:00 Module 6- Performance Parameters of an Inverter 00:05:00 Module 7- Example on Single Phase Half Bridge 00:10:00 Module 8- Single Phase Bridge Inverter R- Load 00:06:00 Module 9- Single Phase Bridge Inverter RL- Load 00:07:00 Module 10- Example on Single Phase Bridge Inverter 00:06:00 Module 11- Three Phase Inverters and Obtaining the Line Voltages 00:15:00 Module 12- Threee Phase Inverters and Obtaining The Phase Voltages 00:17:00 Module 13- Example on Three Phase Inverters 00:16:00 Module 14- Single Pulse Width Modulation 00:13:00 Module 15- Multiple Pulse Width Modulation 00:13:00 Module 16- Example on Multiple Pulse Width Modulation 00:04:00 Module 17- Sinusoidal Pulse Width Modulation 00:16:00 Module 18- Industrial Inverter 00:03:00

Power Electronics for Electrical Engineering
Delivered Online On Demand15 hours 1 minutes
£11

Vim Masterclass

By Packt

This course will help you get started with the Vim editor. You will start the course by learning how to use Vim to make simple edits and as you move ahead, you will become comfortable in editing multiple files at once, creating macros, making global substitutions in files, formatting, normalizing data, and a lot more.

Vim Masterclass
Delivered Online On Demand6 hours 12 minutes
£26.99

Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415)
Delivered OnlineFlexible Dates
Price on Enquiry

DP-203T00 Data Engineering on Microsoft Azure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Introduction to data engineering on Azure What is data engineering Important data engineering concepts Data engineering in Microsoft Azure 2 - Introduction to Azure Data Lake Storage Gen2 Understand Azure Data Lake Storage Gen2 Enable Azure Data Lake Storage Gen2 in Azure Storage Compare Azure Data Lake Store to Azure Blob storage Understand the stages for processing big data Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - Introduction to Azure Synapse Analytics What is Azure Synapse Analytics How Azure Synapse Analytics works When to use Azure Synapse Analytics 4 - Use Azure Synapse serverless SQL pool to query files in a data lake Understand Azure Synapse serverless SQL pool capabilities and use cases Query files using a serverless SQL pool Create external database objects 5 - Use Azure Synapse serverless SQL pools to transform data in a data lake Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement Encapsulate data transformations in a stored procedure Include a data transformation stored procedure in a pipeline 6 - Create a lake database in Azure Synapse Analytics Understand lake database concepts Explore database templates Create a lake database Use a lake database 7 - Analyze data with Apache Spark in Azure Synapse Analytics Get to know Apache Spark Use Spark in Azure Synapse Analytics Analyze data with Spark Visualize data with Spark 8 - Transform data with Spark in Azure Synapse Analytics Modify and save dataframes Partition data files Transform data with SQL 9 - Use Delta Lake in Azure Synapse Analytics Understand Delta Lake Create Delta Lake tables Create catalog tables Use Delta Lake with streaming data Use Delta Lake in a SQL pool 10 - Analyze data in a relational data warehouse Design a data warehouse schema Create data warehouse tables Load data warehouse tables Query a data warehouse 11 - Load data into a relational data warehouse Load staging tables Load dimension tables Load time dimension tables Load slowly changing dimensions Load fact tables Perform post load optimization 12 - Build a data pipeline in Azure Synapse Analytics Understand pipelines in Azure Synapse Analytics Create a pipeline in Azure Synapse Studio Define data flows Run a pipeline 13 - Use Spark Notebooks in an Azure Synapse Pipeline Understand Synapse Notebooks and Pipelines Use a Synapse notebook activity in a pipeline Use parameters in a notebook 14 - Plan hybrid transactional and analytical processing using Azure Synapse Analytics Understand hybrid transactional and analytical processing patterns Describe Azure Synapse Link 15 - Implement Azure Synapse Link with Azure Cosmos DB Enable Cosmos DB account to use Azure Synapse Link Create an analytical store enabled container Create a linked service for Cosmos DB Query Cosmos DB data with Spark Query Cosmos DB with Synapse SQL 16 - Implement Azure Synapse Link for SQL What is Azure Synapse Link for SQL? Configure Azure Synapse Link for Azure SQL Database Configure Azure Synapse Link for SQL Server 2022 17 - Get started with Azure Stream Analytics Understand data streams Understand event processing Understand window functions 18 - Ingest streaming data using Azure Stream Analytics and Azure Synapse Analytics Stream ingestion scenarios Configure inputs and outputs Define a query to select, filter, and aggregate data Run a job to ingest data 19 - Visualize real-time data with Azure Stream Analytics and Power BI Use a Power BI output in Azure Stream Analytics Create a query for real-time visualization Create real-time data visualizations in Power BI 20 - Introduction to Microsoft Purview What is Microsoft Purview? How Microsoft Purview works When to use Microsoft Purview 21 - Integrate Microsoft Purview and Azure Synapse Analytics Catalog Azure Synapse Analytics data assets in Microsoft Purview Connect Microsoft Purview to an Azure Synapse Analytics workspace Search a Purview catalog in Synapse Studio Track data lineage in pipelines 22 - Explore Azure Databricks Get started with Azure Databricks Identify Azure Databricks workloads Understand key concepts 23 - Use Apache Spark in Azure Databricks Get to know Spark Create a Spark cluster Use Spark in notebooks Use Spark to work with data files Visualize data 24 - Run Azure Databricks Notebooks with Azure Data Factory Understand Azure Databricks notebooks and pipelines Create a linked service for Azure Databricks Use a Notebook activity in a pipeline Use parameters in a notebook Additional course details: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-203T00 Data Engineering on Microsoft Azure
Delivered OnlineFlexible Dates
£2,380

Ultimate ASP.NET Core Web API Development Guide

By Packt

Learn to build and deploy a RESTful API using ASP.Net Core, Entity framework, and enterprise-grade practices for a scalable as well as future-proofed web API solution along with understanding the folder structure and files. You will also implement various support tools for logging, documentation, security, and error handling.

Ultimate ASP.NET Core Web API Development Guide
Delivered Online On Demand10 hours 13 minutes
£41.99

Kotlin Programming: Android Coding Bible

4.5(3)

By Studyhub UK

Embark on a journey into the world of Android app development with our comprehensive Kotlin Programming: Android Coding Bible course. This in-depth training will equip you with the knowledge and skills to master Kotlin, a modern and powerful programming language specifically designed for Android development. Whether you're a complete beginner or an experienced programmer seeking to expand your skillset, this course will guide you through the fundamentals of Kotlin, covering topics such as syntax, data types, variables, operators, control flow statements, functions, error handling, and null safety. You'll gain a solid understanding of object-oriented programming principles and learn how to effectively utilize collections to manage and process data. Learning Outcomes Master the fundamentals of Kotlin programming language for Android development Gain a thorough understanding of syntax, data types, variables, operators, and control flow statements Learn how to create and utilize functions to structure and modularize code Effectively handle errors and exceptions to ensure robust and reliable applications Implement null safety mechanisms to prevent NullPointerExceptions and enhance code stability. Why choose this Kotlin Programming: Android Coding Bible course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Kotlin Programming: Android Coding Bible course for? Aspiring Android developers seeking to master Kotlin programming language Individuals with prior programming experience looking to transition to Android development Software engineers aiming to expand their skillset with Kotlin and Android development expertise Students of computer science or related fields interested in learning Android app development Enthusiasts passionate about creating mobile applications for the Android platform. Career path Android Developer (£35,000 - £55,000) Senior Android Developer (£45,000 - £65,000) Android App Architect (£55,000 - £75,000) Mobile Application Developer (£30,000 - £50,000) Software Engineer (£40,000 - £60,000) Full-Stack Developer (£45,000 - £65,000) Prerequisites This Kotlin Programming: Android Coding Bible does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Kotlin Programming: Android Coding Bible was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction & Setup Introduction To This Course 00:02:00 Windows Setup 00:13:00 Mac Setup 00:10:00 Linux Setup 00:12:00 Online Code Editor 00:02:00 Section 02: Basics Variables 00:06:00 Data Types 00:06:00 String 00:05:00 Array 00:07:00 Data Type Conversion 00:05:00 Comments 00:04:00 Arithmetic Operators 00:07:00 Relational Operators 00:06:00 Assignment Operators 00:06:00 Unary Operators 00:05:00 Bitwise Operators 00:09:00 Logical Operators 00:04:00 Input & Output 00:03:00 Section 03: Control Statements Conditional if Statement 00:05:00 When Statement 00:07:00 For Loop 00:04:00 While Loop 00:04:00 do while Loop 00:04:00 Break Statement 00:04:00 Continue Statement 00:04:00 Section 04: Functions Basic Functions 00:03:00 Function Parameters 00:04:00 Return Values 00:04:00 Recursion 00:04:00 Default & Named Arguments 00:06:00 Lambda Function 00:04:00 Higher Order Function 00:05:00 Inline Function 00:02:00 Section 05: Error/Exception Handling Try Catch Block 00:04:00 Try Catch Expression 00:05:00 Multiple Catch Block 00:05:00 Nested Try Catch Block 00:05:00 Finally Block 00:02:00 Throw Keyword 00:02:00 Section 06: NULL Safety Nullable & Non Nullable Types 00:03:00 Smart Cast 00:02:00 Unsafe and Safe Cast 00:03:00 Elvis Operator 00:04:00 Section 07: Collections List: listOf Function 00:06:00 List: mutableListOf Function 00:05:00 List: arrayListOf Function 00:06:00 Map: mapOf Function 00:07:00 Map: HashMap 00:08:00 Map: hashMapOf Function 00:05:00 Map: mutableMapOf Function 00:04:00 Set: setOf Function 00:04:00 Set: mutableSetOf Function 00:04:00 Set: HashSet 00:04:00 Section 08: Classes & Objects Basic Example 00:07:00 Nested and Inner Class 00:06:00 Constructors 00:05:00 Visibility Modifiers 00:06:00 Inheritance 00:05:00 Method Overriding 00:04:00 Property Overriding 00:02:00 Abstract Class 00:03:00 Superclass 00:03:00 Data Class 00:05:00 Multiple Class Inheritance & Interfaces 00:03:00 Sealed Class 00:03:00 Extension Function 00:03:00 Generics 00:05:00 Section 09: Extras Integer Type Range 00:05:00 Regex 00:04:00 Call Java from Kotlin 00:03:00 Call Kotlin from Java 00:02:00 Section 10: Resource Resource 00:00:00 Assignment Assignment - Kotlin Masterclass Programming Course: Android Coding Bible 00:00:00

Kotlin Programming: Android Coding Bible
Delivered Online On Demand5 hours 38 minutes
£10.99

Computer Networks Security from Scratch to Advanced

4.5(3)

By Studyhub UK

In a world where our lives are increasingly online, network security is more important than ever. This Computer Network Security from Scratch to Advanced course will teach you everything you need to know about computer network security, from the basics of how networks work to the most advanced security technologies. In this course, you will learn about the ISO/OSI model and TCP/IP protocols, gaining a solid foundation in understanding how data is transmitted across networks. You will then explore wireless networks, learning about their vulnerabilities and how to secure them effectively.  Our expert instructors will guide you through the complex world of network security, covering essential concepts such as firewalls, intrusion detection and prevention systems, and incident handling. Overall, You will develop practical skills in securing computer networks.  By the end of this course, you will have the confidence and knowledge to safeguard networks against potential threats. This will make you an invaluable asset to any organisation. So don't miss out on this opportunity to enhance your coding prowess and become a master in computer network security. Enrol today and unlock a world of exciting possibilities! Learning Outcomes: Upon successful completion of the Computer Network Security course, you will be able to: Understand the fundamentals of computer networks and their components. Gain in-depth knowledge of the ISO/OSI model and TCP/IP protocols. Identify and mitigate security vulnerabilities in wireless networks. Implement effective network security measures, including firewalls and honeypots. Utilise intrusion detection and prevention systems to safeguard networks. Develop expertise in securing wireless networks against unauthorised access. Acquire skills in physical security and incident handling for network protection. Apply comprehensive network security strategies to ensure data integrity and confidentiality. Who is this course for? This Computer Network Security course is ideal for: IT professionals seeking to enhance their knowledge of network security. Students pursuing a career in cybersecurity or network administration. Software developers interested in understanding the intricacies of computer networks. Network engineers aiming to specialise in network security. Individuals responsible for maintaining the security of organisational networks. Career Path Our Computer Network Security course will prepare you for a range of careers, including: Network Security Analyst: £35,000 - £60,000 per year. Cybersecurity Specialist: £45,000 - £80,000 per year. Network Administrator: £30,000 - £50,000 per year. IT Security Consultant: £40,000 - £80,000 per year. Information Security Manager: £50,000 - £100,000 per year. Network Security Engineer: £40,000 - £70,000 per year. Certification After studying the course materials of the Computer Networks Security from Scratch to Advanced there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Prerequisites This Computer Networks Security from Scratch to Advanced does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Computer Networks Security from Scratch to Advanced was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Course Curriculum Introduction Introduction 00:10:00 Section 01: An Introduction to Computer Networks 1.1 Computer Network 00:11:00 1.2 Computer Network Topologies 00:11:00 1.3 Categories of Computer Network 00:10:00 1.4 Computer Network Devices 00:11:00 1.5 Transmission Media 00:09:00 Section 02: ISO/OSI Model 2.1 ISO/OSI Model 00:10:00 2.2 Application, Presentation, and Session Layers 00:12:00 2.3 Transport and Network Layers 00:11:00 2.4 Data Link and Physical Layers 00:09:00 2.5 ISO/OSI Model in Action 00:10:00 Section 03: TCP/IP Protocols 3.1 Introduction to Computer Networks Protocols 00:11:00 3.2 IP Protocol 00:13:00 3.3 TCP and UDP Protocols 00:12:00 3.4 Application Protocols 00:12:00 3.5 TCP/IP Characteristics and Tools 00:11:00 Section 04: Wireless Networks 4.1 Wireless Networks Benefits 00:09:00 4.2 Types of Wireless Networks 00:12:00 4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00 4.4 Wireless Networks Devices 00:10:00 4.5 Wireless Networks Drawbacks 00:09:00 Section 05: Network Security 5.1 Security Goals 00:09:00 5.2 Securing the Network Design 00:10:00 5.3 TCP/IP Security and Tools 00:12:00 5.4 Port Scanning and Tools 00:11:00 5.5 Sniffing and Tools 00:10:00 Section 06: Firewalls and Honeypots 6.1 Reasons to Use Firewall 00:13:00 6.2 Firewalls Rules 00:11:00 6.3 Firewalls Filtering 00:09:00 6.4 Honeypots 00:07:00 6.5 Bypassing Firewalls 00:08:00 Section 07: Intrusion Detection and Prevention System 7.1 Intrusion Detection System: IDS 00:11:00 7.2 Network IDS: NIDS 00:06:00 7.3 NIDS Challenges 00:09:00 7.4 Snort as NIDS 00:08:00 7.5 Intrusion Prevention Systems: IPS 00:07:00 Section 08: Wireless Network Security 8.1 Wired Equivalent Privacy WEP Attacking 00:11:00 8.2 WPA and AES Protocols 00:09:00 8.3 Wireless Security Misconceptions 00:09:00 8.4 Wireless Attacks and Mitigation 00:09:00 8.5 Secure Network Design with Wireless 00:09:00 Section 09: Physical Security and Incident Handling 9.1 Physical Security Objectives 00:11:00 9.2 Physical Threats and Mitigation 00:11:00 9.3 Defense in Depth (DiD) 00:07:00 9.4 Incident 00:06:00 9.5 Incident Handling 00:14:00 Section 10: Network Security: Conclusion 10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00 10.2 Assets, Threats, and Vulnerabilities 00:04:00 10.3 Risks and Network Intrusion 00:06:00 10.4 Common Attacks 00:09:00 10.5 Security Recommendations 00:06:00 Assignment Assignment - Computer Networks Security from Scratch to Advanced 00:00:00

Computer Networks Security from Scratch to Advanced
Delivered Online On Demand8 hours 8 minutes
£10.99

Mobile Development with .NET MAUI

By Packt

This beginner to the intermediate-level course on .NET MAUI mobile application development enables you to advance your Visual Studio coding skills and implement interfaces using XAML. Learn to develop and publish Minimal API with .NET Core using event driven development while understanding logic and syntax when working on the .NET environment.

Mobile Development with .NET MAUI
Delivered Online On Demand7 hours 32 minutes
£82.99

Jenkins for network engineers

5.0(3)

By Systems & Network Training

Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.

Jenkins for network engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Total FabricPath for engineers

5.0(3)

By Systems & Network Training

Total FabricPath training course description A comprehensive look at Cisco's FabricPath. This course starts with the problems in traditional switched networks then moves onto to how FabricPath solves these problems. As IS-IS is key to loop free topologies in FabricPath networks, this protocol is also studied. What will you learn Explain the benefits of FabricPath. Explain how FabricPath works Explain the role of IS-IS in FabricPath. Integrate FabricPath into existing networks. Total FabricPath training course details Who will benefit: Technical staff working with FabricPath. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total FabricPath training course contents What is FabricPath? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Frame routing. Shortest path. Comparison with TRILL. FabricPath architecture Core and edge, VLANs, vPC+. IS-IS Link layer IS-IS, SPF trees, traffic management. IS -IS extensions for FabricPath. ISIS TLV. FabricPath forwarding Routing table, Switch IDs, multi destination trees, IGMP snooping. Roots. MAC versus switch tables. FabricPath Dynamic Resource Allocation Protocol (DRAP). FabricPath frames Encapsulation, frame format, Switch ID, Forwarding tag. Miscellaneous Basic configuration, interoperation with STP, TCN forwarding

Total FabricPath for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397