• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

702 HTML courses delivered Online

Modern JavaScript From The Beginning

By Packt

Learn and Build Projects with Pure JavaScript (No Frameworks or Libraries)

Modern JavaScript From The Beginning
Delivered Online On Demand21 hours 30 minutes
£125.99

Ruby on Rails 5 - Become a Professional Developer

5.0(10)

By Apex Learning

Overview This comprehensive course on Ruby on Rails 5 - Become a Professional Developer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ruby on Rails 5 - Become a Professional Developer comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ruby on Rails 5 - Become a Professional Developer. It is available to all students, of all academic backgrounds. Requirements Our Ruby on Rails 5 - Become a Professional Developer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 23 sections • 225 lectures • 16:47:00 total length •Course Introduction: 00:06:00 •The Application We're Going to Build: 00:09:00 •Section Introduction gg: 00:01:00 •Introduction to the Command Line Interface in Mac and Linux: 00:10:00 •Installing the X-Code Command Line Tools for Mac: 00:02:00 •Installing Git for Source Code Version Control: 00:03:00 •How to install Homebrew on a Mac: 00:04:00 •Installing GPG Security Systems on a Mac: 00:02:00 •Guide to RVM for Ruby Management: 00:09:00 •Configuring RubyGems and Installing Rails: 00:07:00 •Installing the Postgres Database on a Mac: 00:05:00 •Installing and Working with the Sublime Text Editor: 00:17:00 •Deep Dive into the Command Line - Part 1 of 2: 00:14:00 •Deep Dive into the Command Line - Part 2 of 2: 00:12:00 •PC Environment Setup: Installing Virtual Box: 00:03:00 •Guide to Installing Ubuntu Linux in VirtualBox: 00:10:00 •How to Reboot a Linux Virtual Machine from Terminal: 00:02:00 •Installing Desktop Applications and Ubuntu Navigation Tips and Tricks: 00:09:00 •How to Sign Up for a GitHub Account: 00:03:00 •How to install Git on Linux and Connect to GitHub via SSH: 00:20:00 •How to Securely Install Node and NPM on Linux via NVM: 00:09:00 •Installing the Heroku CLI and the Full Deployment Lifecycle: 00:14:00 •How to install and Work with Sublime Text in Linux: 00:08:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 1 of 2: 00:10:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 2 of 2: 00:15:00 •Fixing the Role Does Not Exist Error: 00:05:00 •Section Introduction ee: 00:01:00 •Signing Up for a Project Management Account: 00:03:00 •Managing the Project Management Dashboard: 00:08:00 •Importing Project Management Tasks into Pivotal Tracker: 00:01:00 •Creating a Rails Application: 00:11:00 •Generating a Blog for the Portfolio Application Using Rails Scaffolds: 00:11:00 •Analyzing the Rails Process: Index and Show Actions: 00:12:00 •Analyzing the Rails Process: New, Create, Update, Edit, and Destroy Actions: 00:14:00 •Analyzing the Rails Process: Routing with Resources: 00:07:00 •Rails File System Overview: 00:13:00 •Updating the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing the Application Generator - Part 1: 00:12:00 •Deep Dive: Analyzing the Application Generator - Part 2: 00:17:00 •Section Introduction bb: 00:02:00 •How to Sign Up for a Github Account: 00:03:00 •Generating SSH Keys to Securely Communicate with Github: 00:04:00 •Guide to GitHub: 00:12:00 •How to Update a .gitignore File to Securely Store Secret Credentials: 00:11:00 •Guide to the Markdown Syntax: 00:10:00 •Updating the Git Sprint in the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing Version Control and Git - Part 1: 00:18:00 •Deep Dive: Analyzing Version Control and Git - Part 2: 00:13:00 •Section Introduction aa: 00:01:00 •Guide to the Rails Controller Generator to Build Pages Part 1: 00:16:00 •Guide to the Rails Controller Generator to Build Pages Part 2: 00:05:00 •Guide to the Rails Model Generator to Build out Data Specific Features: 00:17:00 •Guide to the Rails Model Generator for Building Out the Portfolio Feature: 00:10:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 1: 00:15:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 2: 00:11:00 •Section Introduction SS: 00:02:00 •Building out a Seeds File for Generating Dynamic Sample Data: 00:15:00 •Implement an Index Action from Scratch in Rails: 00:12:00 •Build the New and Create Functionality from Scratch in Rails: 00:20:00 •Implement the Ability to Edit Database Records from Scratch in Rails: 00:13:00 •How to Use the Link to Method in Rails for Creating Dynamic Links: 00:13:00 •How to Implement the Show Action from Scratch in Rails: 00:12:00 •Building the Ability to Delete Items in Rails: 00:15:00 •How to Implement Custom Routes for Pages in Rails: 00:09:00 •How to Override the Rails Resources Routes for the Show Action: 00:07:00 •How to Implement Permalinks in a Rails Application - Part 1: 00:17:00 •How to Implement Permalinks in a Rails Application - Part 2: 00:05:00 •How to Use Enums in Rails to Manage Data Stages: 00:13:00 •How to Implement a Custom Action in Rails via a Button Click - Part 1: 00:12:00 •How to Implement a Custom Action in Rails via a Button Click - Part 2: 00:10:00 •Updating the Project Management Dashboard and Performing a Pull Request: 00:05:00 •Deep Dive: Rails Routing and Data Flow - Part 1: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 2: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 3: 00:16:00 •Section Introduction RR: 00:01:00 •Implementing Data Validations in Rails 5: 00:12:00 •Guide to Data Relationships in Rails: 00:16:00 •How to Implement Custom Scopes in Rails 5: 00:16:00 •How to Set Default Values in Rails 5: 00:13:00 •How to Use Concerns in Rails 5: 00:13:00 •Building an Additional Parent/Child Relationship in Rails 5: 00:10:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Model: 00:17:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Form: 00:17:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 1: 00:16:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 2: 00:14:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 3: 00:15:00 •Section Introduction QQ: 00:01:00 •How to Install Devise in Rails 5: 00:08:00 •Using Devise to Implement Registrations and Login Functionality: 00:18:00 •Building Custom Routes for Authentication Pages with Devise in Rails 5: 00:03:00 •Enable Users to Logout and Dynamically Render View Content in Rails 5: 00:07:00 •How to Add Custom Attributes to a Devise Based Authentication System: 00:15:00 •How to Use Controller Concerns in Rails 5 for Devise Custom Attributes: 00:15:00 •Integrate Virtual Attributes to Extract First and Last Name Data from a User: 00:17:00 •Deep Dive: Using BCrypt to Implement Encryption in Ruby: 00:19:00 •Section Introduction PP: 00:01:00 •Rails Data Flow Review and Working with Params: 00:14:00 •Using Rails Sessions to Share Data between Pages: 00:19:00 •Refactoring the Session Tracker into a Controller Concern: 00:07:00 •Working with Strong Params in a Rails 5 Controller: 00:13:00 •Deep Dive: Building a Guest User Feature in Rails - Part 1: 00:14:00 •Deep Dive: Building a Guest User Feature in Rails - Part 2: 00:18:00 •Section Introduction OO: 00:03:00 •How to Customize the Rails Master Layout File - Part 1: 00:15:00 •How to Customize the Rails Master Layout File - Part 2: 00:09:00 •Guide to Using Multiple Layout Files in Rails 5: 00:14:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Introduction to Partials in Rails 5: 00:08:00 •How to Send Data to Partials to Generate Custom Behavior in Rails 5: 00:15:00 •Guide to View Helpers in Rails 5: 00:17:00 •How to Use the Rails Content Tag Helper to Auto Generate HTML Code: 00:15:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Guide to Manually Configuring Partials to Work with Collections in Rails: 00:07:00 •Guide to Helpful ActionView Helper Methods in Rails 5: 00:15:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 1: 00:12:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 2: 00:15:00 •Section Introduction NN: 00:01:00 •How to Utilize Puts Debugging in Rails: 00:08:00 •Guide to Byebug in Rails 5: 00:09:00 •Guide to Debugging with Pry in Rails 5: 00:19:00 •Proper Way to Implement Error Management in a Rails Application - Part 1: 00:15:00 •Proper Way to Implement Error Management in a Rails Application - Part 2: 00:06:00 •Section Introduction MM: 00:01:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 1: 00:10:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 2: 00:12:00 •Section Strategy for Building a Custom RubyGem: 00:11:00 •How to Build a RubyGem from Scratch - Part 1: 00:06:00 •How to Build a RubyGem from Scratch - Part 2: 00:15:00 •Section Introduction hh: 00:02:00 •Introduction to Authorization and How to Install the Petergate Gem: 00:08:00 •How to Add Roles to the User Model in Rails 5: 00:05:00 •Guide to Implementing Petergate in Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Petergate in Rails 5 Application - Part 2: 00:12:00 •Workplace Facilities: 00:35:00 •Portfolio Design Planning for Layout Specific Styles: 00:09:00 •Implementing the Initial Homepage Design in Rails 5 with Bootstrap 4: 00:09:00 •Building a Navigation Partial for the Master Application Layout with Bootstrap: 00:11:00 •Implement a Footer Along with Adding Method Arguments to a Rails View Helper: 00:14:00 •How to Embed a Google Map into a Rails Application: 00:06:00 •Guide to Updating the Styles for the Devise Edit Account Page in Rails: 00:16:00 •How to Override Default Bootstrap Styles for Text Alignment in the Card Class: 00:06:00 •Implementing Styles for the Devise Registration Page with Bootstrap 4: 00:14:00 •How to Design the Login and Password Pages with Bootstrap 4 Form Styles: 00:15:00 •How to Set Default Values for View Helper Method Arguments in Rails 5: 00:04:00 •Integrating a Different Design for a Separate Blog Layout in Rails 5: 00:04:00 •How to Use Bootstrap 4 to Add a Custom Nav Bar to a Blog Layout in Rails: 00:07:00 •Customizing the Design for the Blog Index Page with Bootstrap 4: 00:19:00 •Guide to Adding Styles to the Blog Show and Form Pages with Bootstrap 4: 00:12:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 1: 00:23:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 2: 00:23:00 •Initial Design for the Portfolio Index Page with Bootstrap 4: 00:17:00 •Integrating the Portfolio Animated Navigation Slider, Footer, and Index: 00:14:00 •Using the Bootstrap 4 Grid Layout to Style the Portfolio Show Page in Rails: 00:06:00 •Implementing Bootstrap 4 Forms for the Portfolio Form Pages: 00:13:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 1: 00:20:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 2: 00:19:00 •Deep Dive: Rails Asset Pipeline Part 1: 00:01:00 •Deep Dive: Rails Asset Pipeline Part 2: 00:19:00 •Section Introduction LL: 00:01:00 •How to Integrate a Position Attribute and Custom Scope in Rails: 00:12:00 •Installing the jQuery UI and html5sortable JavaScript Libraries in Rails 5: 00:09:00 •Initial Implementation of Drag and Drop Interface in Rails 5: 00:13:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 1: 00:18:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 2: 00:11:00 •Implementing Authorization Rules for Drag and Drop Feature with Petergate: 00:07:00 •Deep Dive: jQuery CoffeeScript in Rails: 00:19:00 •Section Introduction jj: 00:01:00 •Introduction to Using Images and the Rails Asset Pipeline: 00:12:00 •How to Set a Full Size Video Background in Rails with Bootstrap 4: 00:08:00 •Deep Dive: Installing and Configuring Carrierwave for Image Uploads in Rails 5: 00:20:00 •Deep Dive: Integrating Connection to AWS S3 for File Hosting with Carrierwave: 00:14:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 1: 00:06:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 2: 00:19:00 •Section Introduction ii: 00:01:00 •Difference Between form_form and form_tag in Rails - Part 1: 00:15:00 •Difference Between form_form and form_tag in Rails - Part 2: 00:16:00 •How to Integrate Cocoon in Rails 5 for jQuery Nested Forms: 00:20:00 •Guide to Integrating Alerts that Automatically Fade Away in Rails 5: 00:15:00 •Refactoring Alert Notifications to Use a Shared View Helper in Rails: 00:13:00 •Deep Dive: How to Build an HTML Form from Scratch the Works with Rails: 00:17:00 •Section Introduction ff: 00:03:00 •Integrating the Twitter Gem to Pull in Tweets in Rails 5: 00:20:00 •How to Render Tweets on a Rails View Page: 00:07:00 •Building a Parser View Helper Method to Make Twitter Links Clickable in Rails: 00:15:00 •Customizing the Styles for the Tech News Page with Bootstrap 4: 00:07:00 •Section Introduction cc: 00:01:00 •Running the Comment Generator and Installing the NoSQL Redis Database in Rails 5: 00:18:00 •Building the Comment Form and Required Controller Actions - Part 1: 00:14:00 •Building the Comment Form and Required Controller Actions - Part 2: 00:08:00 •Refactoring the Comment Form into a Partial and Implementing Data Validations: 00:05:00 •Building the jQuery Functions for Processing Comments - Part 1: 00:19:00 •Building the jQuery Functions for Processing Comments - Part 2: 00:05:00 •How to Create a Broadcast with ActionCable in Rails 5: 00:14:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 2: 00:06:00 •Styling the Comment Section and Implementing Gravatar Based Thumbnails in Rails: 00:16:00 •Section Introduction dd: 00:01:00 •Planning Final Project Updates and Assignment: 00:11:00 •Building a Scope to Show the Most Recent Blog Posts and Hiding Draft Posts: 00:09:00 •Hiding the Show Page for Blogs in Draft Mode in Rails 5: 00:04:00 •How to Add a Drop Down Form Element in Rails 5 for Parent/Child Relationships: 00:09:00 •Using the Controller Generator to Build the Topic Features - Part 1: 00:10:00 •Using the Controller Generator to Build the Topic Features - Part 2: 00:11:00 •How to Build a Widget for the Blog to Render Topics in Rails 5: 00:17:00 •How to Implement Radio Buttons in a Rails Form to Update Enum Values: 00:09:00 •Guide to Integrating Markdown and Syntax Highlighting in a Rails 5 Application: 00:13:00 •Integrating Breadcrumbs and Icons for the Blog Show Pages: 00:12:00 •Building a Partial for Managing Admin Actions for Blog Posts: 00:15:00 •How to Implement a Responsive Navigation Bar with Bootstrap 4: 00:11:00 •Updating the Source/Session Tracking System for the New Layouts: 00:14:00 •How to Integrate a Favicon in Rails 5: 00:08:00 •Implementing Responsive Image Components for the Portfolio Layout: 00:06:00 •Adding Card Styles to the About and Contact Pages: 00:09:00 •How to Implement Collapsable Content Components in a Rails 5 Application: 00:09:00 •How to Integrate Bootstrap Progress Bars in a Rails Application: 00:13:00 •How to Integrate Custom Fonts in a Rails 5 Application: 00:17:00 •Updating the Seeds File in Rails: 00:07:00 •Signing Up for and Creating a New Heroku Application: 00:04:00 •How to Deploy a Rails 5 Application to Heroku: 00:13:00 •Working with the Rails Console on Heroku: 00:11:00 •Installing Redis on Heroku for ActionCable Commenting Feature: 00:04:00 •Configuring Action Cable to Work on Heroku: 00:11:00 •How to Implement the Typed.js Library into a Rails 5 Application: 00:12:00 •How to Install and Configure Webpack, Yarn, and jQuery into a Rails 5.1+ App: 00:19:00 •How to Work with Encrypted Credentials in Rails 5.2+: 00:24:00

Ruby on Rails 5 - Become a Professional Developer
Delivered Online On Demand16 hours 47 minutes
£12

WordPress Security Masterclass - Defeat Hackers and Malware

By Packt

The objective of this course is to teach you both basic and advanced techniques that you can apply to properly secure and harden your WordPress website against hackers and cybercriminals.

WordPress Security Masterclass - Defeat Hackers and Malware
Delivered Online On Demand3 hours 6 minutes
£93.99

Ethical Hacking with Kali Linux

5.0(10)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Cloud Architect Engineer Job Ready Program with Money Back Guarantee

5.0(10)

By Apex Learning

Land Your Dream Job! Get Personalised Career Support & Expert Tips, Craft Your CV, Explore Top Jobs & Ace Interviews!

Cloud Architect Engineer Job Ready Program with Money Back Guarantee
Delivered Online On Demand12 weeks
£1,199

Build a Blog Using ASP.NET Core, Angular 14, and SQL Server

By Packt

This comprehensive course will show you how to use SQL Server, ASP.NET Core, Angular 14, and Bootstrap to build a blog from scratch.

Build a Blog Using ASP.NET Core, Angular 14, and SQL Server
Delivered Online On Demand15 hours 42 minutes
£101.99

Advanced JavaScript Topics

By Packt

This course will take you through all the advanced JavaScript topics, such as libraries, frameworks, advanced functions, module patterns, and a lot more. You will also learn how to use object-oriented programming (OOP) and functional programming principles in JavaScript projects.

Advanced JavaScript Topics
Delivered Online On Demand13 hours 52 minutes
£67.99

TypeScript Tutorial For Beginners

4.3(43)

By John Academy

Course Overview If you are a JavaScript developer who wants to master TypeScript fundamentals, jumpstart on the road to learning TypeScript with this TypeScript Tutorial For Beginners course.  TypeScript is an open-source programming language which builds on JavaScript. The advantage of Typescript over Javascript is that it adds optimal static typing to the JavaScript language. Many Javascript frameworks use typescript, such as Angular. This course covers a comprehensive set of modules to enhance your understanding of TypeScript fundamentals. It explains what typescript is and gives you a clear understanding of its significance. You will learn how to find the data type of a variable in TypeScript and understand how to define a function type variable typescript. You will also learn how to define objects using classes and use the different access modifiers. In time, you will get to grips with the specific skills to write more scalable applications. Whatever you learn in JavaScript adds value to your understanding of TypeScript. You're already halfway there if you're familiar with Javascript. Enrol right now! Learning Outcomes Understand the variables and data types Explore how to define variables using data types Gain in-depth knowledge of the operators Deepen your understanding of the object oriented principles Know how to create and use arrow functions Familiarise with the flow control statements Understand the variable prefixes Have an in-depth understanding of variable prefixes Who is this course for? The TypeScript Tutorial For Beginners course is incredibly beneficial for professionals interested in understanding the fundamentals of TypeScript. Upgrading skills in this course open doors to tremendous opportunities. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The TypeScript Tutorial For Beginners course provides useful skills to possess and would be beneficial for any related profession or industry such as: TypeScript Developer Full Stack Developer Unit 01: Introduction Module 01: What and why TypeScript 00:02:00 Module 02: TypeScript Playground 00:04:00 Module 03: Install TypeScript 00:02:00 Module 04: Install Visual Studio Code 00:01:00 Unit 02: Variables and Data Types Module 01: Introduction 00:03:00 Module 02: First Program Using Visual Studio Code 00:04:00 Module 03: Use JS in a HTML 00:02:00 Module 04: Strings 00:02:00 Module 05: Boolean 00:01:00 Module 06: Any Type 00:01:00 Module 07: Homogenous Arrays 00:03:00 Module 08: Heterogenous Arrays 00:01:00 Module 09: Using alert confirm and prompt 00:03:00 Module 10: Comments 00:02:00 Module 11: Enum Type 00:05:00 Unit 03: Operators Module 01: Arithmetic 00:03:00 Module 02: Assignment 00:04:00 Module 03: Comparison 00:04:00 Module 04: Logical 00:04:00 Module 05: Ternary 00:03:00 Unit 04: Flow Control Statements Module 01: Introduction 00:01:00 Module 02: IF Else Ladder 00:06:00 Module 03: Switch 00:04:00 Module 04: Break and Case Flow 00:03:00 Module 05: While loop 00:03:00 Unit 05: Objects and Arrays Module 01: Introduction 00:02:00 Module 02: Object Literal 00:03:00 Module 03: For-In Loop 00:02:00 Module 04: Arrays 00:04:00 Module 05: De-Structuring Arrays 00:02:00 Module 06: De-Structuring Objects 00:02:00 Unit 06: Functions Module 01: Introduction 00:02:00 Module 02: First Function 00:03:00 Module 03: Passing a parameter 00:01:00 Module 04: Passing Multiple Parameters 00:02:00 Module 05: Optional Parameters 00:04:00 Module 06: Default Values 00:01:00 Module 07: Function as parameter 00:02:00 Module 08: Returning a function 00:03:00 Module 09: Anonymous Functions 00:02:00 Module 10: Overloading 00:05:00 Module 11: REST PARAMS 00:05:00 Module 12: Using a Type on REST PARAM 00:01:00 Unit 07: Arrow Functions Module 01: Introduction 00:02:00 Module 02: First arrow function 00:03:00 Module 03: Passing Parameters 00:03:00 Module 04: Array of Arrow Functions 00:03:00 Unit 08: Variable Prefixes Module 01: let 00:03:00 Module 02: const 00:02:00 Module 02: const functions 00:02:00 Module 04: declare 00:01:00 Unit 09: Interfaces Module 01: Introduction 00:02:00 Module 02: Define an Object Interface 00:03:00 Module 03: Create and object 00:03:00 Module 04: Defining optional properties 00:01:00 Module 05: Interfaces are only compile time 00:01:00 Module 06: Function Interfaces 00:04:00 Module 07: Return Types in Functional interfaces 00:02:00 Module 08: Adding methods to Object Interfaces 00:02:00 Module 09: Array Interfaces 00:03:00 Module 10: String indexed Array Interfaces 00:03:00 Module 11: Extending interfaces 00:06:00 Unit 10: Classes Module 01: Introduction 00:01:00 Module 02: Create a class 00:03:00 Module 03: Add a constructor 00:04:00 Module 04: Add Function properties 00:02:00 Module 05: Power of TypeScript 00:01:00 Module 06: Using for-in and instanceof 00:04:00 Module 07: Implementing an interface 00:06:00 Unit 11: Inheritance Module 01: Introduction 00:03:00 Module 02: Extending a class 00:05:00 Module 03: Create Child Objects 00:07:00 Module 04: Inheriting Functionality 00:04:00 Module 05: Overriding 00:03:00 Unit 12: Access modifiers, Encapsulation and Static Module 01: Public and readonly 00:02:00 Module 02: Encapsulation 00:01:00 Module 03: Private properties 00:04:00 Module 04: Accessor methods 00:02:00 Module 05: Using Static Properties 00:04:00 Module 06: More about static 00:01:00 Module 07: Static Methods 00:03:00 Unit 13: Type Casting Module 01: String to numeric 00:04:00 Module 02: Using the toString method 00:03:00 Module 03: Object Casting 00:02:00 Unit 14: Modules Module 01: Introduction 00:01:00 Module 02: Using Function Modules 00:04:00 Module 03: Import Aliasing and Alternate Export Syntax 00:02:00 Module 04: Default Exports 00:02:00 Module 05: Class Modules 00:01:00 Module 06: Aliasing class modules 00:02:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

TypeScript Tutorial For Beginners
Delivered Online On Demand4 hours 7 minutes
£18

React JS Masterclass - Go From Zero To Job Ready

By Packt

This course offers everything you need to become a React developer, from basic to advanced concepts. The course delves deep into custom hooks, Tailwind CSS, React Router, Redux, Firebase, and React Skeleton. You will learn to build real-world apps with React (eCommerce, Movie Informer, Todolist Manager, Blog, and Word Counter).

React JS Masterclass - Go From Zero To Job Ready
Delivered Online On Demand34 hours 49 minutes
£82.99

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25