• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4078 Engineer courses

The Complete Pentesting and Privilege Escalation Course

By Packt

We are in such an era where cyber security plays an important part. With systems getting smarter, we are seeing machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it is important for pentesters and security researchers to understand the working of these systems and how to breach them.

The Complete Pentesting and Privilege Escalation Course
Delivered Online On Demand12 hours 16 minutes
£14.99

IT Administrator Diploma

4.3(43)

By John Academy

As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology. Description In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately. Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job. There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Software: What is an Operating System FREE 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:10:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle FREE 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Networking: OSI Layers FREE 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 00:59:00 Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT FREE 00:06:00 EMR EHR Issues 00:04:00 Regulations, Standards, and Stakeholders 00:13:00 HIPAA Controls and Compliance 00:07:00 Roles and Responsibilities 00:09:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:32:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:19:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:07:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:14:00 Perform Backups and Disaster Recovery 00:18:00 Mock Exam Mock Exam- IT Administrator Diploma 00:30:00 Final Exam Final Exam- IT Administrator Diploma 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

IT Administrator Diploma
Delivered Online On Demand48 hours
£14.99

AC and Refrigeration Maintenance and Safety

By Compliance Central

All in One Bundle Special Discount Offer Are you looking to enhance your AC and Refrigeration Maintenance and Safety skills? If yes, then you have come to the right place. Our comprehensive courses on AC and Refrigeration Maintenance and Safety will assist you in producing the best possible outcome by learning the AC and Refrigeration Maintenance and Safety skills. Get 6 CPD Accredited Courses for only £41 with 6 Free PDF Certificates worth £24! Course 01: Heating, Ventilation & Air Conditioning (HVAC) Technician Course 02: Electrician Training: Maintaining & Troubleshooting Electronics Devices Course 03: PAT - Portable Appliance Testing Course 04: Electronic Device and Circuits Protection Training Course 05: Basic Electricity and Fundamentals of DC Circuit Course 06: Electrical Safety The AC and Refrigeration Maintenance and Safety bundle is for those who want to be successful. In the AC and Refrigeration Maintenance and Safety bundle, you will learn the essential knowledge needed to become well versed in AC and Refrigeration Maintenance and Safety. Our AC and Refrigeration Maintenance and Safety bundle starts with the basics of AC and Refrigeration Maintenance and Safety and gradually progresses towards advanced topics. Therefore, each lesson of this AC and Refrigeration Maintenance and Safety is intuitive and easy to understand. Why would you choose the AC and Refrigeration Maintenance and Safety course from Compliance Central: Lifetime access to AC and Refrigeration Maintenance and Safety courses materials Full tutor support is available from Monday to Friday with the AC and Refrigeration Maintenance and Safety course Learn AC and Refrigeration Maintenance and Safety skills at your own pace from the comfort of your home Gain a complete understanding of AC and Refrigeration Maintenance and Safety course Accessible, informative AC and Refrigeration Maintenance and Safety learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the AC and Refrigeration Maintenance and Safety bundle Study AC and Refrigeration Maintenance and Safety in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your AC and Refrigeration Maintenance and Safety Course Improve your chance of gaining in demand skills and better earning potential by completing the AC and Refrigeration Maintenance and Safety Curriculum Breakdown of the AC and Refrigeration Maintenance and Safety Curriculum Breakdown of Heating, Ventilation & Air Conditioning (HVAC) Technician Module 01: Introduction to Heating, Ventilation & Air Conditioning (HVAC) Module 02: Heating Fundamentals and Psychrometrics Module 03: HVAC Systems Module 04: Heating and Ventilation Module 05: Air Conditioning Systems for HVAC Technicians Module 06: Compressors, Water Chillers, and Fans Module 07: Piping for HVAC Technician Module 08: Duct System in HVAC Module 09: Refrigeration and Refrigerants Module 10: Special Applications Module 11: HVAC System Selection Module 12: Safety in the HVAC Industry CPD 60 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The AC and Refrigeration Maintenance and Safety bundle helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in AC and Refrigeration Maintenance and Safety. It is also great for professionals who are already working in AC and Refrigeration Maintenance and Safety and want to get promoted at work. Requirements To enrol in this AC and Refrigeration Maintenance and Safety course, all you need is a basic understanding of the English Language and an internet connection. Career path The AC and Refrigeration Maintenance and Safety bundle will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to AC and Refrigeration Maintenance and Safety. Certificates CPD Accredited Certificate of completion Free Digital certificate - Included 6 CPD Accredited PDF Certificate for Free CPD accredited hard copy certificates are available for Hard copy certificate - £9.99 Delivery Charge for Each Hard Copy Certificates: Inside the UK: £3.99 each Outside of the UK: £9.99 each

AC and Refrigeration Maintenance and Safety
Delivered Online On Demand25 hours
£41

Step-by-Step Guide to Developing a Solid Execution Strategy

5.0(10)

By Apex Learning

Overview This comprehensive course on Mechanical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Mechanical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Mechanical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Mechanical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 17 lectures • 01:12:00 total length •The 5 Components of an Execution Strategy: 00:09:00 •Anytime Fitness Case Example: 00:02:00 •Zynga Case Example: 00:02:00 •Why Your Execution Strategy Matters: 00:02:00 •What Investors Look For: 00:01:00 •The Why of Milestones: 00:03:00 •Examples of Milestones: 00:02:00 •Yelp Case Study: 00:01:00 •Your Staffing Plan: 00:09:00 •Your Startup Plan: 00:12:00 •Common Mistakes: 00:04:00 •Risk and Risk Mitigation: 00:08:00 •Identifying Risks: 00:01:00 •Risk Mitigation: 00:03:00 •Key Performance Indicators (KPIs): 00:07:00 •Workshop - Create Your Execution Plan: 00:06:00 •Resource - Step-by-Step Guide to Developing a Solid Execution Strategy: 00:00:00

Step-by-Step Guide to Developing a Solid Execution Strategy
Delivered Online On Demand1 hour 12 minutes
£12

Functional Skills Maths Teacher

5.0(10)

By Apex Learning

Overview This comprehensive course on Mechanical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Mechanical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Mechanical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Mechanical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 68 lectures • 07:29:00 total length •Lecture 1 Introduction: 00:02:00 •Lecture 2 Multiplying any digit number by 11, 22, and 33: 00:09:00 •Lecture 3 Integers and ordering of integers: 00:06:00 •: 00:00:00 •Lecture 5 Operations on Integers: 00:04:00 •Lecture 6 Multiplication and Division of Integers: 00:04:00 •Lecture 7 Powers of Integers (Exponents): 00:04:00 •Lecture 8 Complete knowledge about factors and multiples: 00:06:00 •Lecture 9 Divisibility tests for 2,3,4,5,6: 00:07:00 •Lecture 10 Divisibility rules 7,8,9,10,11: 00:06:00 •Lecture 11 Prime Factorization: 00:06:00 •Lecture 12 Highest Common Factor HCF: 00:10:00 •Lecture 13 Least Common Multiple LCM: 00:16:00 •Lecture 14 Relation between LCM and HCF: 00:04:00 •Lecture 15 Classification of Fractions: 00:04:00 •Lecture 16 Convert mixed to improper and improper to mixed fractions: 00:03:00 •Lecture 17 Equivalent Fractions: 00:04:00 •Lecture 18 Comparing Fractions after converting to like fractions: 00:09:00 •Lecture 19 Reducing a fraction to lowest term: 00:04:00 •Lecture 20 Addition and subtraction OF fractions: 00:08:00 •Lecture 21 Multiplication and division of fractions: 00:11:00 •Lecture 22 Word problems on fractions: 00:16:00 •Lecture 23 BODMAS and rules to remove brackets: 00:03:00 •Lecture 24 Simplify expressions using BODMAS rules: 00:05:00 •Lecture 25 Simplify expressions involving fractions using BODMAS: 00:07:00 •Lecture 26 Decimal numbers in relation to fractions: 00:08:00 •Lecture 27 Like and unlike Decimals: 00:05:00 •Lecture 28 Ordering of Decimal numbers: 00:10:00 •Lecture 29 Addition and subtraction of Decimal: 00:07:00 •Lecture 30 Multiplication of Decimal: 00:03:00 •Lecture 31 Division of Decimal: 00:05:00 •Lecture 32 Rational number: 00:02:00 •Lecture 33 Representation of Rational Numbers on Number line: 00:04:00 •Lecture 34 Determining which fraction is terminating or non terminating: 00:05:00 •Lecture 35 shortcut method of writing decimal expansion of fraction to decimal: 00:08:00 •Lecture 36 Rounding to whole number: 00:06:00 •Lecture 37 Rounding to required number of decimals (1 d.p. ): 00:05:00 •Lecture 38 rounding to significant digits: 00:07:00 •Lecture 39 Practice question on three methods of approximation: 00:05:00 •Lecture 40 Estimation: 00:05:00 •Lecture 41 Scientific Notation: 00:07:00 •Lecture 42 Operation on numbers when they are in scientific notation: 00:06:00 •Lecture 43 Percentage to fraction and fraction to percentage: 00:06:00 •Lecture 44 Percentage of a quantity and conversation to decimal: 00:06:00 •Lecture 45 Expressing one quantity as percentage of another quantity: 00:06:00 •Lecture 46 Finding increase decrease percent: 00:05:00 •Lecture 47 Uses of percentages-Word Problems: 00:09:00 •Lecture 48 Ratio- How to express as simple ratio: 00:09:00 •Lecture 49 How to compare Ratios: 00:04:00 •Lecture 50 Word problems on finding ratios: 00:07:00 •Lecture 51To divide a given quantity into a given Ratio: 00:11:00 •Lecture 52 Proportion: 00:04:00 •Lecture 53 Practice problems on Proportion: 00:06:00 •Lecture 54 Continued proportion: 00:06:00 •Lecture 55 Direct Variation ( or proportion): 00:04:00 •Lecture 56 Problems based on Direct proportion: 00:10:00 •Lecture 57 Inverse Variation ( or proportion): 00:10:00 •Lecture 58 Multiple Ratios: 00:10:00 •Lecture 59 Basics - Profit and Loss: 00:04:00 •Lecture 60 More practice problems on Profit & Loss: 00:06:00 •Lecture 61 Selling price formula and Problems: 00:04:00 •Lecture 62 Cost price formula and Problems: 00:03:00 •Lecture 63 Higher problems on Profit and Loss: 00:08:00 •Lecture 64 Basics - Discount.mp4: 00:05:00 •Lecture 65 Practice problems on Discount: 00:04:00 •Lecture 66 Tax: 00:06:00 •Mock Exam - Functional Skills Maths Teacher: 00:20:00 •Final Exam - Functional Skills Maths Teacher: 00:20:00

Functional Skills Maths Teacher
Delivered Online On Demand7 hours 29 minutes
£12

IT Administration and Networking

5.0(10)

By Apex Learning

Overview This comprehensive course on IT Administration and Networking will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT Administration and Networking comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this IT Administration and Networking. It is available to all students, of all academic backgrounds. Requirements Our IT Administration and Networking is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 128 lectures • 00:55:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Identify the Importance of Risk Management: 00:11:00 •Assess Risk: 00:13:00 •Mitigate Risk: 00:24:00 •Integrate Documentation into Risk Management: 00:15:00 •Classify Threats and Threat Profiles: 00:08:00 •Perform Ongoing Threat Research: 00:13:00 •Resources that Aid in Research of Threats: 00:03:00 •Implement Threat Modeling: 00:10:00 •Assess the Impact of Reconnaissance Incidents: 00:11:00 •Performing Reconnaissance on a Network: 00:07:00 •Examining Reconnaissance Incidents: 00:08:00 •Assess the Impact of Social Engineering: 00:11:00 •Assessing the impact of Social Engineering: 00:08:00 •Assessing the Impact of Phishing: 00:03:00 •Types of Wireless Attacks: 00:30:00 •Intrusion Monitoring: 00:08:00 •Wireless Security Risks: 00:22:00 •Authentication Attacks: 00:21:00 •Rogue Devices: 00:04:00 •Public Hotspots: 00:07:00 •Wireless Security Monitoring: 00:21:00 •Device Tracking: 00:18:00 •WLAN Security Infrastructure: 00:38:00 •Management Protocols: 00:23:00 •Other RADIUS Solutions: 00:16:00 •Introduction: 00:30:00 •Child Safety Online: 01:00:00 •Secure Payment Sites: 01:00:00 •Online Banking: 00:30:00 •How To Keep Your Password Safe: 00:30:00 •Common Scams: 01:00:00 •How I Got Pharmed: 01:00:00 •Virus Protection: 01:00:00 •Self Maintenance: 00:30:00 •Personal Information Online: 01:00:00 •Is The Internet Safe?: 00:30:00 •Importance of Cyber Security: 00:30:00 •Spyware Can Destroy: 00:30:00 •How Does Spyware Spread?: 01:00:00 •How To Remove Spyware: 01:00:00 •Anti Spyware Program: 01:00:00 •The Anti Anti-Spyware Programs: 00:30:00 •Research And Learn More: 00:30:00 •Choosing The Best Anti Spyware Tool: 01:00:00 •Computer Security And Spyware: 01:00:00 •The Programs To Avoid: 00:15:00 •Is It Legal?: 00:30:00 •Checklist Of Protection: 00:15:00 •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:00:00 •Recover from a Security Incident: 00:10:00 •OSI Layers: 00:44:00 •LANs and WANs: 00:14:00 •Network Types: 00:07:00 •Transmissions: 00:36:00 •Cables: 00:41:00 •Fiber Optics: 00:17:00 •Converters and Connectors: 00:27:00 •Wireless Security: 00:15:00 •Authentication.prproj: 00:21:00 •Wireless Security Threats: 00:30:00 •TACACS: 00:10:00 •Keys: 00:26:00 •RADIUS: 00:07:00 •VPN Technologies: 00:16:00 •Tunneling Protocols.prproj: 00:05:00 •Acceptable Use: 01:00:00 •Common Problems: 00:32:00 •Troubleshooting: 00:28:00 •Network Technician Tools: 00:46:00 •Physical and Logical Issues: 00:19:00 •Open or Closed Ports: 00:09:00 •ARP Issues: 00:13:00 •Core Concepts in Healthcare IT: 00:06:00 •EMR EHR Issues: 00:05:00 •Regulations, Standards, and Stakeholders: 00:14:00 •HIPAA Controls and Compliance: 00:08:00 •Roles and Responsibilities: 00:10:00 •Manage Communication and Ethics Issues: 00:15:00 •Legal Best Practices, Requirements, and Documentation: 00:09:00 •Medical Document Imaging: 00:04:00 •Sanitation Management: 00:03:00 •Computing Essentials: 00:05:00 •Networking: 00:33:00 •Manage Servers and Software: 00:27:00 •Hardware Support: 00:14:00 •Set Up a Workstation: 00:08:00 •Troubleshoot Basic IT Issues: 00:15:00 •Troubleshoot Medical IT Issues: 00:20:00 •Implementation of an EMR EHR System: 00:34:00 •Change Control: 00:08:00 •Manage Physical and Logical Security: 00:36:00 •Implement Security Best Practices and Threat Mitigation Techniques: 00:13:00 •Manage Remote Access: 00:06:00 •Manage Wireless Security: 00:15:00 •Perform Backups and Disaster Recovery: 00:16:00

IT Administration and Networking
Delivered Online On Demand55 minutes
£12

History of the Industrial Revolution in Great Britain Level 2

5.0(10)

By Apex Learning

Overview This comprehensive course on History of the Industrial Revolution in Great Britain Level 2 will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This History of the Industrial Revolution in Great Britain Level 2 comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this History of the Industrial Revolution in Great Britain Level 2. It is available to all students, of all academic backgrounds. Requirements Our History of the Industrial Revolution in Great Britain Level 2 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 1 sections • 10 lectures • 01:34:00 total length •Module 01: The Birth of the Industrial Revolution in Britain: 00:06:00 •Module 02: The Textiles Revolution: 00:14:00 •Module 03: The Birth of the Steam Engine: 00:10:00 •Module 04: The Age of Steam Locomotion: 00:15:00 •Module 05: Fueling the Industrial Revolution: 00:09:00 •Module 06: The Engineering Revolution: 00:06:00 •Module 06: The Engineering Revolution: 00:06:00 •Module 08: Black Lives in the Industrial Revolution: 00:05:00 •Module 09: The Birth of the Industrial Revolution: 00:04:00 •Module 10: The Industrial Revolution History Quiz: 00:19:00

History of the Industrial Revolution in Great Britain Level 2
Delivered Online On Demand1 hour 34 minutes
£12

Cost Control Process and Management

5.0(10)

By Apex Learning

Overview This comprehensive course on Cost Control Process and Management will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cost Control Process and Management comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cost Control Process and Management. It is available to all students, of all academic backgrounds. Requirements Our Cost Control Process and Management is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 5 sections • 18 lectures • 02:08:00 total length •Introduction and Fundamental Terms: 00:09:00 •Fundamental terms - Perishable / Non Perishable cost, Inventory Terms: 00:05:00 •Qualities of Good Cost Controller: 00:07:00 •Cost Control Process and Controls related to Purchasing: 00:10:00 •How to estimate Kitchen food Order Process Simplified: 00:06:00 •How to Setup Store PAR for to identify re-order levels: 00:06:00 •Basic Receiving Process Controls: 00:07:00 •Basic Store Process controls: 00:08:00 •Production Controls: 00:05:00 •Recipe Card & Controls: 00:08:00 •Buffet Costing and Menu Pricing: 00:08:00 •Butcher test: 00:09:00 •Bar Spot Checks and Recipe Testing: 00:06:00 •Production Control Via Menu Engineering: 00:08:00 •Slow and Non Moving Inventory: 00:03:00 •Daily & Monthly Food Cost Reports: 00:11:00 •Menu Engineering Reports: 00:09:00 •Cost Control Checklist: 00:03:00

Cost Control Process and Management
Delivered Online On Demand2 hours 8 minutes
£12

CompTIA PenTest+ (Ethical Hacking)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

5.0(10)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12