Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management
Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Identify key benefits of Workspace ONE Access to address your specific use case Describe the different identity sources supported by Workspace ONE Access and apply the most appropriate to your organization's use case Differentiate common authentication methods in Workspace ONE Access and select the most suitable method to fit your business needs Illustrate how to use access policies and implement best practices within your organization Outline various authentication methods and workflows that can be implemented to ensure a robust end-user experience, while meeting your security requirements Summarize the capabilities and benefits of VMware Workspace ONE Intelligent Hub and Hub Services and learn how to effectively implement both Discuss how to implement Workspace ONE Intelligent Hub and Hub Services effectively Describe features of VMware Workspace ONE Intelligence⢠and how to use it to support daily administration and maintenance Explain how to use the Workspace ONE UEM and Workspace ONE Access APIs to perform administration and maintenance Outline Workspace ONE design methodology and how it can apply to your organization In this five-day course, you build on the foundations learned in VMWare Workspace ONE: Deploy & Manage to accelerate the advancement of your deployment and management systems with VMware Workspace ONE© UEM and VMware Workspace ONE© Access?.Through a series of hands-on labs, simulations, and interactive lectures, you effectively evaluate your organization?s current practices and discover opportunities to target improvements in identity, authentication, and access management. Additionally, you learn the strategies and techniques necessary to construct an integrated management strategy, utilizing a comprehensive set of VMware Workspace ONE© services, including Hub Services, the Unified Catalog, Intelligence, and the API. Course Introduction Introduction and course logistics Course objectives Workspace ONE Platform List the high-level components of the Workspace ONE platform Identify benefits of integrating Workspace ONE Access with other Workspace ONE products Explain what services Workspace ONE Access offers Outline the use cases for Workspace ONE Access Connector Identity Sources Identify different directory types in Workspace ONE Access based on identity sources Explain supported web standards for identity Explain Workspace ONE Access workflows of an Active Directory and an LDAP directory Identify features and use cases of third-party identity sources Identify the features and use cases of the VMware AirWatch© Provisioning app Authentication Identify the benefits of modern identity and access management Explain the workflows of connector-based authentication methods, such as Kerberos, RADIUS, and RSA SecureID Explain the workflows of cloud-based authentication methods, such as mobile SSO for iOS, mobile SSO for Android, and Workspace ONE Verify Access Policies Explain access policies and their importance Describe how identity providers (IdPs) and authentication methods work with access policies Explain how to create policy rules following best practice Catalog Define the types of resources in the Workspace ONE Access catalog Outline the common SAML authentication initiation methods for web applications in Workspace ONE Access Describe the high-level integration steps of a Horizon Cloud integration with Workspace ONE Access Hub Services Describe the relationship between Hub Services, Workspace ONE Intelligent Hub, Workspace ONE UEM, and Workspace ONE Access Illustrate the primary components of Hub Services Describe the features and use cases of Workspace ONE Verify Explain how to deploy mobile flows according to a use case Workspace ONE Intelligence Describe how Workspace ONE Intelligence supports your deployment and management strategy Explain how the Digital Employee Experience Management Solution helps improve employees' Anywhere Workspace journey Explain how you can use Dashboards to access different data for your device management use cases Explain how integration works to connect and share data with third parties Workspace ONE Application Programming Interface Outline the use cases for using the Workspace ONE API Explain how to perform Workspace ONE UEM administration and maintenance through the API Explain how to perform Workspace ONE Access administration and maintenance through the API Design Methodology Explain the Workspace ONE business drivers and use case definition Define Workspace ONE services Discuss how to make architectural design decisions Explain how to create component designs Discuss which third-party components are required for infrastructure design Discuss the process of platform integration Explain the required services for service integration Explain how to design user experience
***With this Algebra Teaching Level 3 course, get a Personal Hygiene Course completely FREE and prevent yourself from being infected by Coronavirus and other contagious diseases.*** Algebra Teaching Level 3 is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Algebra Teaching Level 3 and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 11 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Numeracy and IT Desire for entrepreneurship Over the age of 16. Assessment The assessment is straightforward, you need to complete the assignment questions that will be provided to you at the end of the course, you can complete the assignment anytime you want. After you complete and submit your assignment, our tutors will assess your assignment and give you feedback if needed. After your assignment has been assessed and you have passed, you will be qualified and will be able to apply for a course completion certificate. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Introduction Lecture 1 Introduction 00:03:00 Fundamental concepts on Algebraic Expressions Lecture 2 What is Algebra 00:02:00 Lecture 3 Simple Equations 00:05:00 Lecture 4 What are Polynomials 00:04:00 Lecture 5 Terms in Polynomials 00:03:00 Lecture 6 Degree of Polynomials 00:05:00 Lecture 7 Writing statements to algebraic form 00:04:00 Operations on Algebraic Expressions Lecture 8 Integers and common mistakes in solving integers 00:13:00 Lecture 9 Arrangement of Terms 00:07:00 Lecture 10 Powers on integers 00:04:00 Lecture11 Simplification using BODMAS 00:08:00 Lecture 12 Distributive Properties in Polynomials 00:04:00 Lecture 13 Simplify Polynomials 00:10:00 Lecture 14 Additions of Polynomials 00:06:00 Lecture 15 Subtractions of Polynomials 00:10:00 Indices ( Exponents) Lecture 16 The rules of Indices in algebra 00:11:00 Lecture 17 Fractional indices 00:10:00 Lecture 18 Understanding indices (practice questions) 00:07:00 Lecture 19 Problems from IGCSE Last year papers 00:09:00 Multiplication and Division of Algebraic expressions Lecture 20 Multiplication of monomial to Polynomial 00:09:00 Lecture 21 Multiplication of Polynomial by Polynomial 00:06:00 Lecture 22 Division of algebraic expression by a monomial 00:08:00 Lecture 23 Division of algebraic expression by another polynomial 00:09:00 Lecture 24 Division of a polynomial by another polynomial with remainder 00:11:00 Brackets in Algebra Lecture 25 Rules of brackets 00:04:00 Lecture 26 Simplification by removing brackets 00:11:00 Linear equations in one variable Lecture 27 Simplification of algebraic fractions 00:07:00 Lecture 28 Rules to solve linear equations in one variable 00:03:00 Lecture 29 Solving linear equations in one variable 00:07:00 Lecture 30 Solving complex linear equations in one variable 00:10:00 Lecture 31 Word problems on linear equations in one variable 00:13:00 Algebraic Identities Lecture 32 What are Identities? 00:05:00 Lecture 33 Identity ( a + b ) ² 00:13:00 Lecture 34 Identity ( a - b ) ² new 00:07:00 Lecture 35 Identity a² - b² = (a-b) (a +b ) new 00:07:00 Lecture 36 -- Standard Identities ( a + b + c ) ² = a ² + b ² + c ² + 2 a b + 2 a c +2 b c old 00:07:00 Lecture 37 Identity (x + a) (x + b) Identity Derivation & Application new 00:08:00 Lecture 38 Pascal's Triangle _ Identity ( a + b ) ³ new 00:07:00 Lecture 39 Identities( a - b ) ³, ( a ³ + b ³) and (a ³ - b ³) new 00:13:00 Lecture 40-standard-identities-a-³-b-³-c-³-3-a-b-c 00:10:00 Formula : Change of subject of formula Lecture 41 -Changing the subject of formula 00:08:00 Linear Inequalities Lecture 42 - Linear Inequalities 00:12:00 Resolve into factors Lecture 43 - Factorization by taking out common factor 00:10:00 Lecture 44 - Factorization by grouping the terms 00:09:00 Lecture 45 - factorize using identity a ² - b ² 00:07:00 Lecture 46 - factorize using identity (a + b )² and (a - b )² (2) 00:08:00 Lecture 47 - factorize using identity ( a + b + c ) ² 00:05:00 Lecture 48 - factorization by middle term split 00:12:00 Algebraic Fractions Lecture 49 -Simplification of algebraic fractions 00:06:00 Coordinate axis - points and Line graph Lecture 50 All that you need to know about co ordinate axis 00:04:00 Lecture 51 Some important facts needed to draw line graph 00:03:00 Lecture 52 - How to draw a line graph on coordinate plane 00:03:00 Lecture 53 Drawing line graphs 00:06:00 System of simultaneous linear equations in two variables Lecture 54 Simultaneous Linear Equations in two variables- intro 00:03:00 Lecture 55 Graphical method of solving linear equations 00:06:00 Lecture 56 Graphical method - more problems 00:10:00 Lecture 57 Method of Elimination by substitution 00:09:00 Lecture 58 Method of Elimination by Equating coefficients 00:11:00 Lecture 59 Method of Elimination by cross multiplication 00:07:00 Lecture 60 Equations reducible to simultaneous linear equations 00:12:00 Lecture 61 Word Problems on Linear equations 00:18:00 Polynomials Lecture 62 Polynomials and Zeros of polynomials 00:10:00 Lecture 63 Remainder Theorem 00:04:00 Lecture 64 Factor Theorem 00:08:00 Lecture 65 Practice problems on Remainder and Factor Theorem 00:09:00 Lecture 66 Factorization using factor Theorem 00:10:00 Quadratic Polynomials Lecture 67 Zeros of polynomials α, β & γ 00:10:00 Lecture 68 Relation between zeros and coefficients of a polynomials 00:13:00 Lecture 69 Finding polynomials if zeros are known 00:06:00 Lecture 70 Practice problems on zeros of polynomials 00:10:00 Lecture 71Problems solving with α and β (part 1) 00:11:00 Lecture 72 Problems solving with α and β (part 2) 00:10:00 Quadratic Equations Lecture73 what are Quadratic equations 00:03:00 Lecture 74 Solutions by factorization method 00:12:00 Lecture 75 Solutions by completing square formula 00:06:00 Lecture 76 Deriving Quadratic formula 00:05:00 Lecture 77 Practice problems by Quadratic formula 00:07:00 Lecture 78 Solving complex quadratic equations by Quadratic Formula 00:11:00 Lecture 79 Solutions of reducible to Quadratic Formula 00:09:00 Lecture 80 Skilled problems on Quadratic Equations 00:07:00 Lecture 81 Exponential problems reducible to Quadratic Equations 00:06:00 Lecture 82 Nature of Roots of Quadratic Equations 00:09:00 Lecture 83 Word problems on quadratic Equations Part 1 00:13:00 Lecture 84 Word problems on quadratic Equations Part 2 00:11:00
Unlock the dynamics of human society with Spark Generation! Dive into the realms of culture, identity, and social change. Gain a comprehensive understanding of how societies function thanks to this AS Level self-paced course provided by Spark Generation. :)
Unlock the dynamics of human society with Spark Generation! Dive into the realms of culture, identity, and social change. Gain a comprehensive understanding of how societies function thanks to this AS Level self-paced course provided by Spark Generation. :)
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower
IT Network Support Engineers play a vital role in ensuring the smooth operation of computer networks in various organisations. They are responsible for maintaining the network infrastructure, resolving network issues, and ensuring that the network is secure from cyber threats. This course is designed to equip learners with the knowledge and skills required to work in this dynamic and challenging field. The IT Network Support Engineer program covers a broad range of topics related to network security and management. Students will learn about asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. The course is designed to provide learners with a comprehensive understanding of network security and management, including risk management, asset management, security protocols, and security operations. Through this course, learners will develop critical skills, including troubleshooting and problem-solving, network design and implementation, security management, and network maintenance. Additionally, learners will gain a deep understanding of the different security technologies used in the industry and learn how to design, implement, and maintain secure networks. This IT Network Support Engineer Bundle Consists of the following Premium courses: Course 01: Network Security Level 2 Course 02: Computer Networks Security Course 03: Cloud Computing Training Course 04: AWS Certified Cloud Practitioner Course 05: CompTIA Networking - Level 4 Course 06: Cisco ASA Firewall Training Course 07: CompTIA Network+ Certification Course 08: Cyber Security Level 3 Course 09: GDPR Data Protection Level 5 Course 10: Data Center Training Essentials: General Introduction Course 11: Data Center Training Essentials: Mechanical & Cooling Learning Outcomes: Upon completion of this course, learners will be able to: Design, implement, and maintain secure network infrastructure Identify and assess network vulnerabilities and develop mitigation strategies Conduct network security assessments and implement security controls Configure and troubleshoot network devices, including routers, switches, and firewalls Design and implement security policies and procedures in accordance with industry standards and best practices Enrol now in IT Network Support Engineer to advance your career, and use the premium study materials from Apex Learning. The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your IT Network Support Engineer expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Course Curriculum: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security The IT Network Support Engineer program is designed to provide learners with a comprehensive understanding of network security and management. The course covers a wide range of topics related to network security, including asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. The course is divided into several modules, each covering a specific area of network security and management. The course begins with an introduction to security and risk management, where learners will gain an understanding of the different types of security threats and how to manage them. Learners will also learn about asset security, which covers the different types of assets that organisations need to protect, including data, hardware, and software. The course then moves on to security engineering, where learners will gain an understanding of the different security technologies used in the industry, including cryptography, access control, and intrusion detection systems. Communication and network security is covered next, where learners will learn about secure network protocols and how to configure and troubleshoot network devices. The course then covers identity and access management, where learners will learn how to manage user access to the network and implement security controls to prevent unauthorised access. Security assessment and testing are covered next, where learners will learn how to conduct network security assessments and implement security controls. The final module of the course covers security operations and software development security. Here, learners will learn how to design and implement security policies and procedures in accordance with industry standards and best practices. They will also learn about software security, including secure coding practices and software testing methodologies. CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals who want to start a career in IT Network Support Engineering Network administrators looking to advance their skills in network security IT professionals interested in network security and management Those who wish to gain knowledge and skills in network security and management Requirements This IT Network Support Engineer course has been designed to be fully compatible with tablets and smartphones. Career path Upon completing the IT Network Support Engineer program, learners can pursue various career paths, including: Network Support Engineer - £25,000 to £40,000 Network Security Analyst - £30,000 to £50,000 IT Security Consultant - £40,000 to £70,000 Network Architect - £50,000 to £90,000 Chief Information Security Officer - £80,000 to £150,000 Certificates Certificate of completion Digital certificate - Included Cost of PDF Certificates is included in course price Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Network Security Level 2) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.
Introduction: HM Treasury maintains comprehensive records of all persons and entities currently subject to sanctions. This means that they face financial restrictions, usually on the basis of their links with terrorist activity or human rights abuse. If you run a business, you need to make sure that you do not handle money or assets owned by sanctioned parties, or enter into an arrangement whereby you grant them access to funds. To do so is a criminal offence. In this course, you will learn how financial sanctions work and how to meet your duties under the law. What You Will Learn: How financial sanctions work and the purpose and scope of the UK financial sanctions regime The scope and purpose of the Consolidated List and the UK Investment Ban List The parties responsible for maintaining these lists and how to use target and name matches to ensure that you do not engage in any transactions with individuals and entities named on the list How to verify customers' identity, and the information you should collect when undertaking transactions Benefits of Taking This Course: If you are a business owner, you will benefit from learning how to avoid conducting business with sanctioned parties If you are responsible for financial transactions as part of your job, you will benefit from learning how to verify a customer's identity and check whether they are currently facing sanctions If you work in the financial sector, this course will provide you with a good introduction to sanctions If you work in the public sector, you may benefit from furthering your understanding of how the Financial Conduct Authority (FCA), the Treasury and other bodies work together to combat crime
Overview This comprehensive course on Algebra Fundamentals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Algebra Fundamentals comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Algebra Fundamentals. It is available to all students, of all academic backgrounds. Requirements Our Algebra Fundamentals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 83 lectures • 11:02:00 total length •Lecture 1 Introduction: 00:03:00 •Lecture 2 What is Algebra: 00:02:00 •Lecture 3 Simple Equations: 00:05:00 •Lecture 4 What are Polynomials: 00:04:00 •Lecture 5 Terms in Polynomials: 00:03:00 •Lecture 6 Degree of Polynomials: 00:05:00 •Lecture 7 Writing statements to algebraic form: 00:04:00 •Lecture 8 Integers and common mistakes in solving integers: 00:13:00 •Lecture 9 Arrangement of Terms: 00:07:00 •Lecture 10 Powers on integers: 00:04:00 •Lecture11 Simplification using BODMAS: 00:08:00 •Lecture 12 Distributive Properties in Polynomials: 00:04:00 •Lecture 13 Simplify Polynomials: 00:10:00 •Lecture 14 Additions of Polynomials: 00:06:00 •Lecture 15 Subtractions of Polynomials: 00:10:00 •Lecture 16 The rules of Indices in algebra: 00:11:00 •Lecture 17 Fractional indices: 00:10:00 •Lecture 18 Understanding indices (practice questions): 00:07:00 •Lecture 19 Problems from IGCSE Last year papers: 00:09:00 •Lecture 20 Multiplication of monomial to Polynomial: 00:09:00 •Lecture 21 Multiplication of Polynomial by Polynomial: 00:06:00 •Lecture 22 Division of algebraic expression by a monomial: 00:08:00 •Lecture 23 Division of algebraic expression by another polynomial: 00:09:00 •Lecture 24 Division of a polynomial by another polynomial with remainder: 00:11:00 •Lecture 25 Rules of brackets: 00:04:00 •Lecture 26 Simplification by removing brackets: 00:11:00 •Lecture 27 Simplification of algebraic fractions: 00:07:00 •Lecture 28 Rules to solve linear equations in one variable: 00:03:00 •Lecture 29 Solving linear equations in one variable: 00:07:00 •Lecture 30 Solving complex linear equations in one variable: 00:10:00 •Lecture 31 Word problems on linear equations in one variable: 00:13:00 •Lecture 32 What are Identities?: 00:05:00 •Lecture 33 Identity ( a + b ) ²: 00:13:00 •Lecture 35 Identity a² - b² = (a-b) (a +b ) new: 00:07:00 •Lecture 36 -- Standard Identities ( a + b + c ) ² = a ² + b ² + c ² + 2 a b + 2 a c +2 b c old: 00:07:00 •Lecture 37 Identity (x + a) (x + b) Identity Derivation & Application new: 00:08:00 •Lecture 38 Pascal's Triangle _ Identity ( a + b ) ³ new: 00:07:00 •Lecture 39 Identities( a - b ) ³, ( a ³ + b ³) and (a ³ - b ³) new: 00:13:00 •Lecture 40 - Standard Identities a ³ + b ³ + c ³ - 3 a b c: 00:10:00 •Lecture 41 -Changing the subject of formula: 00:08:00 •Lecture 42 - Linear Inequalities: 00:12:00 •Lecture 43 - Factorization by taking out common factor: 00:10:00 •Lecture 44 - Factorization by grouping the terms: 00:09:00 •Lecture 45 - factorize using identity a ² - b ²: 00:07:00 •Lecture 46 - factorize using identity (a + b )² and (a - b )² (2): 00:08:00 •Lecture 47 - factorize using identity ( a + b + c ) ²: 00:05:00 •Lecture 48 - factorization by middle term split: 00:12:00 •Lecture 49 -Simplification of algebraic fractions: 00:06:00 •Lecture 50 All that you need to know about co ordinate axis: 00:04:00 •Lecture 51 Some important facts needed to draw line graph: 00:03:00 •Lecture 52 - How to draw a line graph on coordinate plane: 00:03:00 •Lecture 53 Drawing line graphs: 00:06:00 •Lecture 54 Simultaneous Linear Equations in two variables- intro: 00:03:00 •Lecture 55 Graphical method of solving linear equations: 00:06:00 •Lecture 56 Graphical method - more problems: 00:10:00 •Lecture 57 Method of Elimination by substitution: 00:09:00 •Lecture 58 Method of Elimination by Equating coefficients: 00:11:00 •Lecture 59 Method of Elimination by cross multiplication: 00:07:00 •Lecture 60 Equations reducible to simultaneous linear equations: 00:12:00 •Lecture 61 Word Problems on Linear equations: 00:18:00 •Lecture 62 Polynomials and Zeros of polynomials: 00:10:00 •Lecture 63 Remainder Theorem: 00:04:00 •Lecture 64 Factor Theorem: 00:08:00 •Lecture 65 Practice problems on Remainder and Factor Theorem: 00:09:00 •Lecture 66 Factorization using factor Theorem: 00:10:00 •Lecture 67 Zeros of polynomials α, β & γ: 00:10:00 •Lecture 68 Relation between zeros and coefficients of a polynomials: 00:13:00 •Lecture 69 Finding polynomials if zeros are known: 00:06:00 •Lecture 70 Practice problems on zeros of polynomials: 00:10:00 •Lecture 71Problems solving with α and β (part 1): 00:11:00 •Lecture 72 Problems solving with α and β (part 2): 00:10:00 •Lecture73 what are Quadratic equations: 00:03:00 •Lecture 74 Solutions by factorization method: 00:12:00 •Lecture 75 Solutions by completing square formula: 00:06:00 •Lecture 76 Deriving Quadratic formula: 00:05:00 •Lecture 77 Practice problems by Quadratic formula: 00:07:00 •Lecture 78 Solving complex quadratic equations by Quadratic Formula: 00:11:00 •Lecture 79 Solutions of reducible to Quadratic Formula: 00:09:00 •Lecture 80 Skilled problems on Quadratic Equations: 00:07:00 •Lecture 81 Exponential problems reducible to Quadratic Equations: 00:06:00 •Lecture 82 Nature of Roots of Quadratic Equations: 00:09:00 •Lecture 83 Word problems on quadratic Equations Part 1: 00:13:00 •Lecture 84 Word problems on quadratic Equations Part 2: 00:11:00