• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1189 Installation courses delivered Online

C# Console and Windows Forms Development with Entity Framework

By Packt

In this course, you will learn C# programming for desktop applications. These lessons assume no prior knowledge of programming or the C# language and will have you up and running in no time. By the end of this course, you will have enough knowledge to build a functional Windows Forms application, connected to a Microsoft SQL Server database, with all your program code and changes being tracked on GitHub.

C# Console and Windows Forms Development with Entity Framework
Delivered Online On Demand15 hours 14 minutes
£41.99

VMware Aria Operations for Networks: Install, Configure, Manage [V6.8]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network professionals and who design, build, operate, manage, and troubleshoot software-defined networking and security, and application owners who need visibility across multi-cloud environments Overview By the end of the course, you should be able to meet the following objectives: Explain the features and architecture of VMware Aria Operations for Networks Describe the VMware Aria Operations for Networks installation processes and requirements Navigate the VMware Aria Operations for Networks GUI Recognize major use cases for VMware Aria Operations for Networks and their benefits Deploy VMware Aria Operations for Networks Use VMware Aria Operations for Networks to monitor, operate, analyze, and troubleshoot the infrastructure supporting your applications This two-day, hands-on course gives you the skills to deploy and use VMware Aria Operations? for Networks to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of VMware Aria Operations for Networks and how to use it to simplify daily operation and troubleshooting tasks. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Networks Identify the use cases for VMware Aria Operations for Networks Access the VMware Aria Operations for Networks Home page View VMware Aria Operations for Networks entity data Perform searches for specific entity data Create entity search queries Find and use event data VMware Aria Operations for Networks Architecture and Components Identify the components of VMware Aria Operations for Networks Describe the function of each component and how the components interact Check the health of VMware Aria Operations for Networks components VMware Aria Operations for Networks Installation Deploy VMware Aria Operations for Networks components Configure the pairing relationship between the platform VM and the collector VM Troubleshoot platform VM and collector VM configuration problems Explain how data sources export flow information Add VMware vCenter Server© to VMware Aria Operations for Networks Add a VMware NSX to VMware Aria Operations for Networks Configure IPFIX Distinguish between the mechanisms used to scale VMware Aria Operations for Networks Select the appropriate scaling mechanism for your environment Describe how clusters are expanded Integrate VMware Aria Operations with VMware Aria Operations for Networks Import a VMware Aria Operations for Networks instance into VMware Aria Suite Lifecycle VMware Aria Operations for Networks Use Cases Explain use cases for VMware Aria Operations for Networks Create VMware Aria Operations for Networks applications Perform application discovery Plan and optimize micro-segmentation and security for applications Explain the use of flow analytics Use flow information from physical devices in security planning Generate virtual machine path topologies between entities using flows Extract useful information from path topologies Validate NSX deployments Monitor and troubleshoot NSX events Operations and Troubleshooting Common Issues Perform VMware Aria Operations for Networks operations by using VMware vSphere© tags Use the flow analytics dashboards to perform flow analysis Set and configure Intents to identify aberrations in the behaviour of entities Use VMware Aria Operations for Networks tools to troubleshoot common problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Aria Operations for Networks: Install, Configure, Manage [V6.8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Aria Operations for Networks: Install, Configure, Manage [V6.8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Aria Operations for Networks: Install, Configure, Manage [V6.8]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Network administrators Network operators Network architects System installers System integrators System administrators Overview After taking this course, you should be able to: Explain the advantages of CNC for service lifecycle functions Describe the architecture of the Cisco Crosswork Network Controller and its components Describe the main operations features and capabilities of CNC Perform the installation and initial configuration of the Cisco Crosswork Network Controller Onboard network devices in CNC Enable data collection in CNC using Crosswork Data Gateway Provision traffic engineering policies to be used by network services Explore network topology and inventory details by using the available visualizing tools Optimize a network service instance for bandwidth utilization during the lifetime of service instances Bind newly provisioned Layer 2 and Layer 3 VPN service instances to traffic engineering policies Develop custom Layer 2 and Layer 3 Multiprotocol Label Switching (MPLS) VPN service definitions Configure Key Performance Indicators (KPIs) to monitor the health of devices Develop plays and playbooks for closed loop automation Automate network operations and maintenance tasks Explore closed loop workflows Use northbound application programing interfaces to integrate other systems with CNC Send alerts to northbound systems Configure the collection and exporting of data to external endpoints Manage the Crosswork cluster Deploy CNC for optimal availability, scalability, and performance Troubleshoot CNC issues The Implementing Cisco Crosswork Network Controller (SPCNCI) v1.0 course introduces you to the Cisco© Crosswork Network Controller (CNC) and its installation. Through a series of lectures and labs you will learn to use Cisco CNC to streamline, manage, and automate service lifecycle functions spanning across service provisioning, visualization, monitoring, and optimization. You will also get an overview of Cisco CNC as an IP transport network controller platform, of its components, and of its utility in various use-cases such as boosting operational agility, improving intent-based service delivery, and reducing the cost of operations.This course will also teach you about creating custom service definitions, tactical traffic engineering policies, automated provisioning of services, and real-time traffic optimization. Additionally, you will learn about implementing closed loop automation workflows for remediation, optimization, and maintenance. Finally, this course will teach you to understand APIs to help interface with other systems, as well as best practices, including sizing guidelines across components of the CNC meant to meet scalability and high-availability requirements. Course Outline Introducing Cisco CNC Exploring Cisco CNC Architecture Describing Cisco CNC Unified Functions Installing and Configuring Cisco CNC Onboarding Network Devices Setting Up Data Collection Provisioning Traffic Engineering Policies Visualizing and Exploring Network Topology and Inventory Details Optimizing Networks Using Closed-Loop Automation Orchestrating VPN Services Developing Custom L2VPN and L3VPN Service Definitions Configuring KPIs to Monitor Device Health Automating Maintenance and Closed Loop Remediation Automating Network Maintenance Tasks Exploring Closed Loop Workflows Exploring Northbound APIs for External System Integration Managing System Alerts Collecting and Exporting Data to External Endpoints Operating a Cisco Crosswork Cluster Implementing CNC for High Availability, Scalability, and Performance Troubleshooting Cisco CNC Additional course details: Nexus Humans Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Crosswork Network Controller v1.0 (SPCNCI)
Delivered OnlineFlexible Dates
Price on Enquiry

The Simplest Guide™ to Clinical Data Analysis with SAS

By Packt

Data science is quickly taking over all aspects of life, and a huge impact of this can be seen in the healthcare department. From medical imaging to genomics, we now leverage data to make better medical decisions. In this course, we will see how clinical trial data can be effectively managed using SAS.

The Simplest Guide™ to Clinical Data Analysis with SAS
Delivered Online On Demand2 hours 1 minutes
£93.99

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system. This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: AFM Overview AFM Overview AFM Availability AFM and the BIG-IP Security Menu Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Module 3: Network Firewall AFM Firewalls Contexts Modes Packet Processing Rules and Direction Rules Contexts and Processing Inline Rule Editor Configuring Network Firewall Network Firewall Rules and Policies Network Firewall Rule Creation Identifying Traffic by Region with Geolocation Identifying Redundant and Conflicting Rules Identifying Stale Rules Prebuilding Firewall Rules with Lists and Schedules Rule Lists Address Lists Port Lists Schedules Network Firewall Policies Policy Status and Management Other Rule Actions Redirecting Traffic with Send to Virtual Checking Rule Processing with Packet Tester Examining Connections with Flow Inspector Module 4: Logs Event Logs Logging Profiles Limiting Log Messages with Log Throttling Enabling Logging in Firewall Rules BIG-IP Logging Mechanisms Log Publisher Log Destination Filtering Logs with the Custom Search Facility Logging Global Rule Events Log Configuration Changes QKView and Log Files SNMP MIB SNMP Traps Module 5: IP Intelligence Overview Feature 1 Dynamic White and Black Lists Black List Categories Feed Lists IP Intelligence Policies IP Intelligence Log Profile IP Intelligence Reporting Troubleshooting IP Intelligence Lists Feature 2 IP Intelligence Database Licensing Installation Configuration Troubleshooting IP Intelligence iRule Module 6: DoS Protection Denial of Service and DoS Protection Overview Device DoS Protection Configuring Device DoS Protection Variant 1 DoS Vectors Variant 2 DoS Vectors Automatic Threshold Configuration Variant 3 DoS Vectors Device DoS Profiles DoS Protection Profile Dynamic Signatures Dynamic Signatures Configuration DoS iRules Module 7: Reports AFM Reporting Facilities Overview Examining the Status of Particular AFM Features Exporting the Data Managing the Reporting Settings Scheduling Reports Examining AFM Status at High Level Mini Reporting Windows (Widgets) Building Custom Widgets Deleting and Restoring Widgets Dashboards Module 8: DoS White Lists Bypassing DoS Checks with White Lists Configuring DoS White Lists tmsh options Per Profile Whitelist Address List Module 9: DoS Sweep Flood Protection Isolating Bad Clients with Sweep Flood Configuring Sweep Flood Module 10: IP Intelligence Shun Overview Manual Configuration Dynamic Configuration IP Intelligence Policy tmsh options Extending the Shun Feature Route this Traffic to Nowhere - Remotely Triggered Black Hole Route this Traffic for Further Processing - Scrubber Module 11: DNS Firewall Filtering DNS Traffic with DNS Firewall Configuring DNS Firewall DNS Query Types DNS Opcode Types Logging DNS Firewall Events Troubleshooting Module 12: DNS DoS Overview DNS DoS Configuring DNS DoS DoS Protection Profile Device DoS and DNS Module 13: SIP DoS Session Initiation Protocol (SIP) Transactions and Dialogs SIP DoS Configuration DoS Protection Profile Device DoS and SIP Module 14: Port Misuse Overview Port Misuse and Service Policies Building a Port Misuse Policy Attaching a Service Policy Creating a Log Profile Module 15: Network Firewall iRules Overview iRule Events Configuration When to use iRules More Information Module 16: Recap BIG-IP Architecture and Traffic Flow AFM Packet Processing Overview

F5 Networks Configuring BIG-IP AFM : Advanced Firewall Manager
Delivered OnlineFlexible Dates
Price on Enquiry

SQL Database Administrator at QLS Level 5

4.5(3)

By Studyhub UK

Immerse yourself in the realm of database administration with the SQL Database Administrator at QLS Level 5 course. Gain mastery over SQL environment setup, statement fundamentals, advanced commands, and database creation. From optimizing queries to managing databases and tables, this course equips you with the skills to excel as a proficient SQL Database Administrator. Learning Outcomes Establish a strong foundation in SQL database administration, covering setup and configuration. Master SQL statement basics, including querying, filtering, and sorting data effectively. Utilize GROUP BY statements for data aggregation and summarization. Navigate the intricacies of table joins to extract meaningful insights from complex datasets. Demonstrate proficiency in advanced SQL commands and statements for enhanced database management. Why choose this SQL Database Administrator at QLS Level 5 course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this SQL Database Administrator at QLS Level 5 course for? Aspiring Database Administrators and SQL Professionals. Software Developers Seeking to Expand Their Database Management Skills. IT Professionals Interested in Database Administration. Data Analysts and Data Engineers Looking to Enhance Their SQL Knowledge Career path SQL Database Administrator - $60,000 to $110,000/year. Database Developer - $70,000 to $120,000/year. Data Engineer - $80,000 to $130,000/year. Database Manager - $90,000 to $150,000/year. Database Architect - $100,000 to $160,000/year Prerequisites This SQL Database Administrator at QLS Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £115 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Course Introduction Introduction 00:04:00 Course Curriculum Overview 00:05:00 Overview of Databases 00:10:00 SQL Environment Setup MySQL Installation 00:16:00 MySQL Workbench Installation 00:09:00 Connecting to MySQL using Console 00:09:00 SQL Statement Basics Overview of Challenges 00:04:00 SQL Statement Basic 00:16:00 SELECT Statement 00:09:00 SELECT DISTINCT 00:05:00 Column AS Statement 00:12:00 COUNT built-in Method usage 00:11:00 SELECT WHERE Clause - Part One 00:05:00 SELECT WHERE Clause - Part Two 00:11:00 SQL Statement Basic 00:16:00 SQL Limit Clause Statement 00:09:00 SQL Using BETWEEN with Same Column Data 00:11:00 How to Apply IN Operator 00:11:00 Wildcard Characters with LIKE and ILIKE 00:11:00 GROUP BY Statements Overview of GROUP BY 00:06:00 Aggregation function SUM() 00:09:00 Aggregation MIN() and MAX() 00:05:00 GROUP BY - One 00:09:00 GROUP BY - Two 00:12:00 HAVING Clause 00:05:00 JOINS Overview of JOINS 00:04:00 Introduction to JOINS 00:04:00 AS Statement table 00:03:00 INNER Joins 00:14:00 FULL Outer Join 00:11:00 LEFT Outer JOIN 00:08:00 RIGHT JOIN 00:08:00 Union 00:07:00 Advanced SQL Commands / Statements Timestamps 00:12:00 EXTRACT from timestamp 00:10:00 Mathematical Functions 00:12:00 String Functions 00:22:00 SUBQUERY 00:13:00 Creating Database and Tables Basic of Database and Tables 00:06:00 DataTypes 00:10:00 Primarykey and Foreignkey 00:06:00 Create Table in SQL Script 00:13:00 Insert 00:11:00 Update 00:07:00 Delete 00:04:00 Alter Table 00:09:00 Drop Table 00:05:00 NOT NULL Constraint 00:08:00 UNIQUE Constraint 00:09:00 Databases and Tables Creating a Database backup 00:12:00 10a Overview of Databases and Tables 00:05:00 10c Restoring a Database 00:07:00 Assignment Assignment - SQL Database Administrator at QLS Level 5 04:00:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00

SQL Database Administrator at QLS Level 5
Delivered Online On Demand11 hours 50 minutes
£10.99

Enscape Rendering Training

By London Design Training Courses

Why Choose Enscape Rendering Training Course? Course info Best real-time visualization plugin, integrates with design tools like Revit, SketchUp, Rhino, ArchiCAD, and Vectorworks. Experience swift and real-time visualization within your preferred applications, eliminating extra costs and adjustments. Elevate your design projects effortlessly with Enscape. Duration: 5 hrs Method: 1-on-1, Personalized attention Schedule: Tailor your own hours of your choice, available from Mon to Sat between 9 am and 7 pm What does the Enscape Training & Interactive Workshop offer? The Enscape Training & Interactive Workshop is designed to help you get up and running with Virtual Reality (VR) in a cost-effective manner. It covers hardware and software setup, navigation techniques, real-time updates, material settings, and more. The workshop also allows participants to experience VR firsthand. What will I learn in the Enscape (VR) Training and Interactive Workshop? The workshop covers hardware setup, software installation, and configuration. You will learn how to migrate models from Revit and SketchUp into VR, navigate through designs, update objects and materials in real-time, and utilize various visual styles and settings. The course also includes interactive workshops with support from our expert tutors. Course Outline: Enscape Rendering Software Training (5 hours) Course 1: Enscape for Revit Hour 1: 1. Introduction to Enscape: Overview of Enscape rendering software, its features, and benefits. 2. Installing and Setting up Enscape: Step-by-step guidance on installing and configuring Enscape for Revit. 3. Enscape Interface: Familiarizing with the Enscape user interface and navigation controls within Revit. Hour 2: 4. Enscape Materials: Exploring material creation, application, and customization within Enscape for Revit. 5. Lighting in Enscape: Understanding different lighting options, adjusting light settings, and creating realistic lighting effects. Hour 3: 6. Enscape Camera Settings: Manipulating camera angles, perspectives, and settings for optimal visualization. 7. Enscape Rendering Settings: Exploring various rendering settings and techniques to enhance the quality of the final output. Hour 4: 8. Enscape Rendering Workflow: Demonstrating a step-by-step workflow for generating renderings and walkthroughs using Enscape in Revit. 9. Advanced Features: Introduction to advanced features such as creating panoramas, virtual reality (VR) walkthroughs, and creating animations in Enscape. Hour 5: 10. Tips and Tricks: Sharing tips and techniques for maximizing efficiency and achieving high-quality results in Enscape for Revit. 11. Q&A and Troubleshooting: Addressing participant questions, providing troubleshooting guidance, and discussing common challenges and solutions. OR Course Outline: Enscape Rendering Software Training (5 hours) Course 1: Enscape for Sketchup Hour 1: 1. Introduction to Enscape: Overview of Enscape rendering software, its features, and benefits for SketchUp users. 2. Installing and Setting up Enscape: Step-by-step guidance on installing and configuring Enscape for SketchUp. 3. Enscape Interface: Familiarizing with the Enscape user interface and navigation controls within SketchUp. Hour 2: 4. Enscape Materials: Exploring material creation, application, and customization within Enscape for SketchUp. 5. Lighting in Enscape: Understanding different lighting options, adjusting light settings, and creating realistic lighting effects. Hour 3: 6. Enscape Camera Settings: Manipulating camera angles, perspectives, and settings for optimal visualization in SketchUp. 7. Enscape Rendering Settings: Exploring various rendering settings and techniques to enhance the quality of the final output. Hour 4: 8. Enscape Rendering Workflow: Demonstrating a step-by-step workflow for generating renderings and walkthroughs using Enscape in SketchUp. 9. Advanced Features: Introduction to advanced features such as creating panoramas, virtual reality (VR) walkthroughs, and creating animations in Enscape. Hour 5: 10. Tips and Tricks: Sharing tips and techniques for maximizing efficiency and achieving high-quality results in Enscape for SketchUp. 11. Q&A and Troubleshooting: Addressing participant questions, providing troubleshooting guidance, and discussing common challenges and solutions.

Enscape Rendering Training
Delivered in London or OnlineFlexible Dates
£180

Introduction to Sketchup Course 1-2-1

By Real Animation Works

Sketchup face to face training customised and bespoke.

Introduction to Sketchup Course 1-2-1
Delivered in London or OnlineFlexible Dates
£220

Python Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 17 Hours 21 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about python programming Understand the core competencies and principles of python programming Explore the various areas of python programming Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert python programmer and developer Python Hacking Masterclass Course Master the skills you need to propel your career forward in python programming. This course will equip you with the essential knowledge and skillset that will make you a confident python programmer and developer and take your career to the next level. This comprehensive python hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this python hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective python programming practice and equip you with the essential skills, confidence and competence to assist you in the python programming industry. You'll gain a solid understanding of the core competencies required to drive a successful career in python programming. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for python programmer and developer or for people who are aspiring to specialise in python programming. Enrol in this python hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive python hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this python programming can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This python hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This python hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This python hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction and Setup Welcome to Python for ethical hacking! 00:05:00 VirtualBox Installation 00:12:00 Kali Linux Installation 00:17:00 Adding Guest Additions 00:15:00 Adding Guest Additions 00:15:00 Port and Vulnerability Scanning Coding A Simple Port Scanner 00:15:00 Adding Raw_Input To Our Port Scanner 00:09:00 Scanning The First 1,000 Ports 00:05:00 Coding An Advanced Port Scanner Part 1 00:13:00 Coding an Advanced Port Scanner Part 2 00:09:00 Finishing And Testing Our Scanner 00:09:00 Configuring IP Address And Installing Metasploitable 00:08:00 Returning Banner From Open Port 00:15:00 Coding A Vulnerability Scanner Part 1 00:12:00 Coding A Vulnerability Scanner Part 2 00:07:00 SSH and FTP Attacks Automating SSH Login Part 1 00:10:00 Automating SSH Login Part 2 00:09:00 Testing Our SSH Login Program 00:09:00 Coding A SSH Brute-Forcer 00:11:00 Executing Commands On Target After Brute-Forcing SSH 00:10:00 Anonymous FTP Login Attack 00:10:00 Username & password List Attack On FTP 00:18:00 Password Cracking SHA256, SHA512, MD5 00:09:00 Cracking SHA1 Hash With Online Dictionary 00:17:00 Getting Password From MD5 Hash 00:13:00 Cracking Crypt Passwords With Salt 00:24:00 Sniffers, Flooders and Spoofers Changing MAC Address Manually 00:09:00 Coding MAC Address Changer 00:17:00 Theory Behind ARP Spoofing 00:05:00 Crafting Malicious ARP Packet 00:19:00 Coding ARP Spoofer 00:14:00 Forwarding Packets And Restoring ARP Tables 00:08:00 Spoofing Our IP Address And Sending Message With TCP Payload 00:12:00 Running SynFlooder With Changed Source IP Address 00:11:00 Getting Source And Destination MAC Address From Received Packets 00:25:00 Sniffing FTP Username And Password Part 1 00:08:00 Sniffing FTP Username And Password Part 2 00:12:00 Getting Passwords From HTTP Websites 00:14:00 Cloning Any Webpage 00:11:00 Printing DNS Queries 00:10:00 Coding DNS Spoofer Redirecting Response To Cloned Page 00:17:00 Setting IP Table Rules And Running DNS Spoofer 00:11:00 Network Analysis Analyzing Ethernet Header 00:16:00 Analyzing IP Header Part 1 00:10:00 Analyzing IP Header Part 2 00:26:00 Analyzing TCP Header 00:15:00 Analyzing UDP Header 00:13:00 Multi-functioning Reverse Theory Behind Socket Programming 00:07:00 Wine And Pyinstaller Installation 00:08:00 Setting Up Listener 00:08:00 Establishing Connection Between Target And Server 00:07:00 Implementing Send & Receive Functions 00:11:00 Executing Commands On Target System 00:12:00 Importing JSON Library To Parse Data 00:08:00 Converting Python Backdoor To .Exe 00:08:00 Using OS Library To Change Directory 00:10:00 Downloading & Uploading Files To Target PC 00:19:00 Hiding Our Backdoor And Creating Persistence 00:14:00 Trying To Connect To Server Every 20 Seconds 00:08:00 Downloading Files To Target PC 00:12:00 Capturing Screenshot On Target PC 00:23:00 Administrator Privilege Check 00:08:00 Starting Other Programs With Our Shell 00:11:00 Running Our Shell As An Image, Audio, PDF 00:20:00 Coding a Keylogger Installing Pynput 00:06:00 Printing Space Character 00:09:00 Calling Timer On Our Keylogger 00:10:00 Adding Keylogger To Our Backdoor 00:13:00 Command and Control Center What Is A Threaded Server 00:05:00 Accepting Connections With A Thread 00:13:00 Managing Multiple Sessions 00:09:00 Testing Threaded Server With Windows 10 Target 00:09:00 Fixing Q Command 00:11:00 Coding Exit Function 00:14:00 Attacking Multiple Targets And Gathering Botnet 00:16:00 Website Penetration Testing Stealing Saved Wireless Passwords 00:22:00 Saving Passwords To A File 00:03:00 Bruteforcing Gmail 00:10:00 Bruteforcing Any Login Page Part 1 00:13:00 Bruteforcing Any Login Page Part 2 00:10:00 Finding Hidden Directories Part 1 00:05:00 Finding Hidden Directories Part 2 00:07:00 Discovering Subdomains 00:12:00 Changing HTTP Headers 00:14:00 Starting Basic And Digest Authentication Bruteforcer 00:10:00 Controlling Threads 00:09:00 Coding Run Function 00:10:00 Printing Usage And Testing Our Program 00:13:00 Taking A Look At Ransomware 00:08:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Python Hacking Masterclass
Delivered Online On Demand
£19

The Art of Doing - Python Network Applications with Sockets

By Packt

Welcome to a project-based intermediate course. This course is designed to learn how to create new and exciting projects using various python modules. In each section, we will build a project and with each project, you will learn how to create an online multiplayer game, AOL-style chat room, and more!

The Art of Doing - Python Network Applications with Sockets
Delivered Online On Demand14 hours 33 minutes
£41.99