Register on the Typography for Designers today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Typography for Designers course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Typography for Designers course Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Typography for Designers course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Typography 1.2.Intro to typography course 00:05:00 1.3. how typography cousre is laid out 00:02:00 1.4.What are Font Families 00:05:00 1.5.typography-antomy-terms 00:07:00 1.6.Humanist Old and Transitional 00:07:00 1.7.Sans-Serif Script Other Sans 00:06:00 1.8. Line-length in Typography 00:03:00 1.9.Alignments of your text 00:05:00 1.10.Line-height matters 00:07:00 1.11.Letter Spacing kerning 00:05:00 1.12.exercise to apply all we learned 00:11:00 More about Typography 2.1.Different Types of Hyphens & Dashes 00:02:00 2.2. About Quotation Marks 00:03:00 Typography Scales and Grids 3.1.1Expanding Scales-NEW 00:07:00 3.1.Roles Of Typefaces-1 00:05:00 3.2.Typography Scale-1 00:03:00 3.3Type Hierarchy Online Tools 00:05:00 3.4.How Many Levels Of Hierarchy-update 00:03:00 3.5.Vertical Rhythm-updated 00:05:00 3.6.Vertical Rhythm In Photoshop 00:07:00 3.7.exercise Vertical Rhythm-1 00:12:00 3.8.modular Grid 00:11:00 EXERCISES: Modular + Baseline Grid Design Ultimate Exericse 4.1.prepare Modular Grid For Design Exericse 00:11:00 4.2.Modular Design part 1 00:16:00 4.3.Modular design 2nd 00:10:00 4.4.Modular Design Refining the design 00:03:00 4.5.Modulr Design 3rd Layout 00:10:00 How to Select Fonts? 5.1.how Many Fonts 00:05:00 5.2.Moods Voices Of Typefaces- 00:13:00 5.3.colors Efffect On Typo 00:04:00 How to Pair Fonts? 6.1.Font Pairing Intro-Updated 00:04:00 6.2.X-height Matching 00:05:00 6.3.Contrast Matching 00:10:00 6.4.Look For Similar Features 00:10:00 6.5.Avoid Too Similarity 00:04:00 6.6.Pairing Fonts Same Family Designer 00:05:00 6.7.Online Tools Font Pairing 00:06:00 How to get Variation in text for Great Designs 7.1.variation with bold italic 00:04:00 7.2.variation with colors 00:03:00 7.3.Variation with Reverse-colors updated- 00:03:00 7.4.variation with lineheight 00:04:00 EXERCISES: Dribbble LEVEL Designs 8.1. Dribbble Hero Design preperation 00:05:00 8.2.dribbble Hero Design V1 Part 1 00:16:00 8.3.dribbble Hero Design V1 Part 2 00:16:00 8.4. Dribbble Hero Variation Intro 00:04:00 8.5. Dribbble Hero Variation 2 Part 1 00:08:00 8.6. Dribbble Hero Variation 2 Part2 00:06:00 Exercise: Social Media Ad Design with 3 different fonts 9.1.summer Discount Ad DesignPreperations 00:04:00 9.2 Preparing base of design 00:07:00 9.3. Adding Text and styles 00:14:00 9.4.final Adjustments 00:03:00 Nature Health Themed Typography Exercises 10.1.juicy Design Exercise Preperations-1 00:03:00 10.2.making Of Juicy Design-2 00:16:00 10.3.juicy Designs Final-3 00:12:00 Typography for Iphone and Android App Designs (Mobile App Typography) 11.1 Intro IOS point sizing 00:05:00 11.2.IOS Font Specs 00:03:00 11.3.Designing multiple IOS Screens 00:14:00 11.4. Student Question About Resoltutions 00:14:00 11.5.connect Your Iphone With Photoshop 00:05:00 11.6. Android Typography 00:04:00 11.7.android Design Exercise For All Sizes 00:09:00 Typography for Web Developers 12.1.Using Google Fonts 00:04:00 12.2.using Premium Fonts 00:06:00 12.3.Intro to css font sizigin 00:03:00 12.4.what Is Em Font Size 00:08:00 12.5.What is rem font size 00:05:00 12.6.How percentage font size works 00:04:00 12.7.How vw font unit works 00:04:00 Responsive Typography for Developers 13.1.how Vertical Rhythm Works In CSS 00:08:00 13.2.Gridlover Exercise 00:08:00 13.3.custom Typographic Scale Boostrap-3 00:13:00 13.4.dont Use Code From Typescale 00:02:00 New and Latest in Typography 14.1.responsive Typography Intro 00:07:00 14.2.different Ratios And Scales In Responsive Typography 00:10:00 14.3.percentage Value Technique For Responsive Type 00:12:00 15.1 Color Fonts 00:05:00 15.2 variable-fonts101 00:08:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Highlights of the Course Course Type: Online Learning Duration: 5 Hours 37 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about UX design Understand the core competencies and principles of UX design Explore the various areas of UX design Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert UX designer UX Design Course Online Master the skills you need to propel your career forward in UX design. This course will equip you with the essential knowledge and skillset that will make you a confident UX designer and take your career to the next level. This comprehensive UX design course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this UX design course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective UX design practice and equip you with the essential skills, confidence and competence to assist you in the UX design industry. You'll gain a solid understanding of the core competencies required to drive a successful career in UX design. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for UX designer or for people who are aspiring to specialise in UX design. Enrol in this UX design course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive UX design course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this UX design can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This UX design course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This UX design course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This UX design course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction To User Expericne, Ux Roles and How to Be a UX Designer Can I Be A UX Designer 00:03:00 Different Roles Of UX Designers2 00:06:00 Major Parts Of Every UX Design 00:05:00 What Is Human Centered Design (HCD) 00:03:00 What Is Agile UX. (Student Request Headshot Video) 00:06:00 Double Diamond Model Of Design By Don Norman 00:05:00 Using Root Cause Analysis In UX Design 00:02:00 Seven Stages Of Action By Don Norman 00:05:00 5 Second Usability Test 00:02:00 What Are Affordances, Anti-Affordances And Signifiers 00:06:00 Human Centered Design, Double Diamond Model Of Design And Root cause Analysis Examples Of Affordances And Signifiers 00:06:00 Affordances & Signifiers Explained - Headshot Video 00:05:00 What Is Mapping And Natural Mapping 00:09:00 Conceptual And Mental Models In UX 00:06:00 Working Memory And Our Attention Span 00:06:00 Examples Of Working Memory And attention 00:07:00 Recognition Rather Than Recall 00:04:00 Examples Of Recognition Rather Than Recall 00:04:00 How User Expectations Actually Work 00:04:00 User Expectations Example - Headshot Video 00:02:00 Examples Of User Expectations 00:08:00 Limits Of Peripheral Vision 00:05:00 Examples Of Limited Peripheral Vision 00:07:00 What Is Context Of Use In User Experience 00:05:00 Explanation Of Context Of use - Headshot Video 00:02:00 Why Stakeholders Are As Important As Users 00:04:00 What Is Information Architecture. (Headshot Video) 00:05:00 Examples Of Information Architecture (Navigation Best Practices) 00:11:00 Human Laziness, Decision Paralysis And Reading Pattern 00:05:00 Principles & Behavior Patterns, Decision Making, Scanning Patterns And Change Blindness Human Decision making - How Old and New Brain works 00:03:00 Humans Hate Change 00:03:00 Our Goals And Change Blindness 00:03:00 Examples Of Human Behavior, Decision Paralysis And Why We Hate Change 00:08:00 Designing For Humans - How to Design Better Products For Humans Discoverability - Can Your Users Discover Your Product's Features 00:06:00 Learnability - Can Your Users Learn To Use Your Product Easily 00:04:00 Examples Of Visual And Audio Feedback 00:08:00 Feedback Within The Context - Walmart Example 00:03:00 Consistency In Design & Function With Examples 00:06:00 Constraints And How To Use Them To Improve UX 00:06:00 What Are Slips & Mistakes And How To Avoid Them 00:04:00 Designing For Errors With Examples 00:05:00 User Always In Control With Examples 00:04:00 Using Grouping And Chunking To Improve UX 00:07:00 Physical & Mental Limitations Of Humans 00:04:00 How Developers Can Improve User Experience? Using Design Patterns - Don't re-Invent The Wheel 00:05:00 Why Users Always Need Speed And When To Use Delays 00:06:00 Power Of Smart Defaults & Suggestion 00:06:00 Guiding And Training Users At Every Step 00:04:00 Reduce Number Of Barriers To Entry For Users 00:05:00 Use Natural Language Rather Than Codes 00:08:00 Examples Of Natural Language Or Converstational Forms 00:03:00 Timing Of Notifications And Our Perception 00:07:00 Using Google Analytics To Know More About Users 00:05:00 Data Driven Design And Anticipatory Design With Examples 00:04:00 Case Study Solution - GPtools App 00:12:00 Assessment Assessment - UX Design 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Deploy and manage Virtual Delivery Agent machines to on-premises resource locations as well as in Microsoft Azure using MCS. Integrate Citrix Cloud and Citrix Virtual Apps and Desktops 2203 LTSR with Microsoft Azure Active Directory. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you will learn how to create a new Citrix DaaS deployment on Citrix Cloud, with a resource location on Microsoft Azure. You will also learn how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and a Microsoft Azure resource location that will host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. Module 1: Introduction to Citrix DaaS New Citrix Workspace Packaging Citrix Virtual Apps and Desktops - On-Premises Site What is Citrix Cloud? Why Citrix DaaS? What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? Citrix Cloud Administration Module 2: Planning - Citrix DaaS Architecture, Security, and Operations Architecture and Deployment Options Citrix DaaS Security Citrix DaaS Operations Module 3: Planning - Citrix Cloud Connectors Cloud Connector Architecture Cloud Connector Services and Communications Overview Cloud Connector Operations in a Resource Location Cloud Connector Resiliency Installing, Updating, and Removing Cloud Connectors Supported Domain Scenarios for Cloud Connectors Securing Cloud Connector Communications Local Host Cache (LHC) Citrix Cloud Connector vs Delivery Controller Operations Module 4: Planning - Citrix DaaS Resource Locations Citrix DaaS Resource Locations Citrix DaaS Hosting Connections Zones Module 5: Active Directory, Authentication, and Authorization Active Directory Design Options Desktops from Non-Domain Joined VDAs Citrix Federated Authentication Service and Identity Provider Services Module 6: Planning - Provisioning VDA Workloads and Delivering Resources Master Images Machine Creation Services (MCS) in Citrix DaaS Citrix Provisioning in Citrix DaaS Machine Catalogs Delivery Groups Citrix Cloud Library Module 7: Planning - Provide Access in Citrix Cloud Selecting Between Citrix digital workspace experience and StoreFront Citrix StoreFront and Citrix digital workspace experience Communications Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway Access Layer Communications User Authentication Module 8: Planning - Citrix DaaS Administration Citrix Cloud Manage and Monitor Delegated Administration Citrix DaaS Remote PowerShell Software Development Kit Manage Multiple Resource Locations Module 9: Planning - Public Cloud Considerations General Public Cloud Considerations Using Autoscale to Power Manage Machines in a Public Cloud Microsoft Azure as a Citrix DaaS Resource Location Amazon Web Services as a Citrix DaaS Resource Location Google Cloud as a Citrix DaaS Resource Location Module 10: Planning - Migrating to Citrix DaaS from Citrix Virtual Apps and Desktops Citrix Cloud Migration Options and Considerations Citrix Automated Configuration Tool Citrix Image Portability Service Module 11: Manage - Operations and Support in Citrix Cloud Citrix Cloud Connector Support Updating and Rolling Back Machine Catalogs VDA Restore Citrix Self-Help Strategy Monitor Your Environment Module 12: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 13: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 14: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 15: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 16: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 17: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 18: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 19: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Additional course details: Nexus Humans CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Visual Studio Code is currently the number #1 IDE among the programmer's community. All the big companies are moving towards using VS Code for active development. Get ahead of the curve and learn to use Visual Studio Code with ease.
Course Overview The Complete Front-End Web Development Course! offers a comprehensive journey through the essential skills and knowledge required to excel in the field of web development. Covering foundational and advanced topics in HTML, CSS, JavaScript, jQuery, and Bootstrap, this course is designed to equip learners with a strong understanding of front-end technologies. Through structured learning and carefully crafted projects, participants will build confidence in creating dynamic and visually appealing websites. By the end of the course, learners will possess the technical skills and creative insight needed to produce professional-grade web interfaces and interactive experiences. Whether aiming to launch a new career, enhance existing knowledge, or develop a portfolio of work, students will emerge with capabilities that are highly valued in the modern digital landscape. Course Description This course delves deeply into the fundamentals and advanced aspects of front-end web development, starting with the core principles of HTML and CSS before progressing into JavaScript, jQuery, and Bootstrap frameworks. Learners will explore how to structure web pages, style them effectively, and implement interactivity to enhance user experience. Throughout the modules, participants will engage with real-world concepts, build functional projects, and understand the relationships between various web technologies. The curriculum has been thoughtfully curated to ensure a progressive learning journey, empowering students with the ability to create responsive, accessible, and modern websites. From coding basic layouts to constructing browser extensions, each step is designed to broaden technical fluency and creative problem-solving skills. Upon completion, learners will have acquired a robust skill set applicable to numerous roles within the technology and design sectors. Course Modules Module 01: Welcome to the course! Module 02: Web Development Basics - HTML Module 03: Advanced HTML Concepts Module 04: Introduction to Cascading Style Sheets (CSS) Module 05: Advanced CSS Module 06: JavaScript for Beginners Module 07: More JavaScript Concepts Module 08: Getting Started with jQuery Module 09: More jQuery Module 10: Bootstrap Basics Module 11: Project #2 - Pipboy from Fallout 4 Module 12: Project #3 - Google Chrome Extension Module 13: Final Thoughts Module 14: BONUS - Coding Another Google Chrome Extension (See full curriculum) Who is this course for? Individuals seeking to build a strong foundation in web development. Professionals aiming to enhance their career prospects in the digital industry. Beginners with an interest in web design and front-end technologies. Career changers looking to enter the field of web development. Students wishing to expand their technical skill set for future opportunities. Career Path Front-End Web Developer Junior Web Developer UI/UX Developer HTML/CSS Developer JavaScript Developer Web Designer Technical Assistant within a digital agency Freelance Web Developer
Gain a thorough grasp of time series analysis and its effects, as well as practical tips on how to apply machine learning methods and build RNNs. Learn to train RNNs efficiently while taking crucial concepts such as overfitting and underfitting into account. The course offers a useful, hands-on manner for learning Python methods and principles.
The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. Who is this course for? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Learn to operate Nomad to deploy and manage applications and services across multiple environments, including on-premises, cloud, and hybrid. Learn from the expert who will guide you through lectures, demonstrations, and real-world scenarios, giving you the skills and knowledge you need to succeed with Nomad HashiCorp skillsets.
This course will show you why Hadoop is one of the best tools to work with big data. With the help of some real-world data sets, you will learn how to use Hadoop and its distributed technologies, such as Spark, Flink, Pig, and Flume, to store, analyze, and scale big data.