• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1350 Installation courses

Bitcoin-Powered Business Growth

By Compete High

🚀 Unlock Your Business Potential with Bitcoin-Powered Business Growth! 🚀 Are you ready to take your business to new heights? Discover the revolutionary power of Bitcoin and supercharge your growth with our exclusive online course - 'Bitcoin-Powered Business Growth.'   🌐 Why Bitcoin? 🌐 In an ever-evolving digital landscape, Bitcoin isn't just a currency; it's a game-changer for entrepreneurs and businesses. Embrace the future of finance and learn how to leverage Bitcoin to propel your business forward.   💡 What You'll Learn: 💡 📈 1. Mastering Bitcoin Basics: Gain a comprehensive understanding of Bitcoin and blockchain technology. Learn how to integrate Bitcoin into your business operations seamlessly. 💼 2. Bitcoin for Business Expansion: Explore innovative ways to use Bitcoin to expand your customer base. Unlock international markets and tap into new revenue streams. 💰 3. Bitcoin as an Investment Strategy: Discover how to use Bitcoin as a strategic investment tool for your business. Learn risk management techniques to navigate the volatile market. 🔒 4. Securing Your Assets with Bitcoin: Explore robust security measures to protect your business and assets. Implement best practices for storing and managing Bitcoin securely. 🌐 5. Navigating the Global Economy: Understand the impact of Bitcoin on the global economy. Position your business for success in the era of digital currencies.   🎓 Why Choose Our Course? 🎓 ✅ Expert-Led Instruction: Learn from industry experts with hands-on experience in Bitcoin and business growth. ✅ Practical Insights: Gain actionable insights and strategies that you can implement immediately. ✅ Interactive Learning: Engage in discussions, case studies, and real-world scenarios to enhance your learning experience. ✅ Lifetime Access: Enjoy unlimited access to course materials, updates, and a supportive community.   🌟 Don't miss this opportunity to transform your business with the disruptive power of Bitcoin! 🌟 Course Curriculum Basic Overview 00:00 A Word About Bitcoin and Stripe 00:00 Set Up With Bitpay 00:00 Marketplaces 00:00 Your Cloud Based Network - Part 3 00:00 Create a Product in Send Owl 00:00 Adding-Your-Autoresponder 00:00 Adding-Coupons 00:00 Adding Upsells 00:00 Adding-An-Affiliate-Program 00:00 The Rocketr Network 00:00 Set Up Bitcoin in Rocketr 00:00 Add-a-Product in Rocketr 00:00 Add-A-Pay-Button 00:00 Add a Rocketr Pay Button To Your Site 00:00 Setting Up Affiliates in Rocketr 00:00 Adding Coupons in Rocketr 00:00 E-Mail Marketing In Rocketr 00:00 Blacklisting-Buyers 00:00 Introduction to WordPress and Bitcoin 00:00 Advanced Overview of the Advanced Course 00:00 WordPress Vs. Shopify 00:00 Set Up Shopify 00:00 Setting Up Shopify to Accept Bitcoin 00:00 Setting Up Shopify to Accept Bitcoin - Part 2 00:00 Promoting Your Shopify Products Through Your AR 00:00 Promoting Your Shopify Products To YouTubers 00:00 WordPress Installation 00:00 WordPress Plugin - Digital Paybox 00:00 WordPress Plugin - Bitpay and Wp-Ecommerce 00:00 WordPress Plugin - WP - E-Commerce Additional Settings 00:00 Installing Woocommerce 00:00 Woo Commerce Plugin Set Up Part One 00:00 Woo Commerce Plugin Set Up Part 2 00:00 Woo Commerce Plugin Set Up Part 1 00:00 Woo Commerce Plugin 2 Set Up Part 2 00:00 Affiliate Connections Through Woo Commerce 00:00 Woo Commerce Theme Customization 00:00 Woo Commerce Autoresponders 00:00 Conclusion 00:00

Bitcoin-Powered Business Growth
Delivered Online On Demand1 hour 38 minutes
£25

Efficient Task Management Using Basecamp

By Compete High

🚀 Unlock Peak Productivity: Master Efficient Task Management with Basecamp! 🚀   Are you drowning in a sea of never-ending tasks, struggling to keep your projects organized and your team on the same page? Say goodbye to chaos and hello to streamlined success with our transformative online course: 'Efficient Task Management Using Basecamp'!   🌟 Why Choose Basecamp? 🌟   Basecamp is the game-changer your workflow needs! This powerful project management tool has revolutionized the way teams collaborate, ensuring seamless communication, and boosting productivity. Our comprehensive course will empower you to harness the full potential of Basecamp, turning it into your ultimate productivity ally.   🚀 What You'll Gain:   1️⃣ Master Basecamp Essentials: Navigate through Basecamp's features with ease. From project creation to task assignment, we've got you covered.   2️⃣ Effective Communication Strategies: Say goodbye to messy email threads! Learn how to centralize communication, ensuring everyone stays in the loop.   3️⃣ Streamlined Task Management: Say hello to efficiency! Discover how to organize tasks, set deadlines, and keep everyone accountable, all within the Basecamp platform.   4️⃣ Collaboration Superpowers: Unleash the true power of teamwork with Basecamp's collaborative features. See how seamless collaboration can elevate your project outcomes.   5️⃣ Time-Saving Tips and Tricks: Work smarter, not harder. Explore time-saving hacks to optimize your workflow and achieve more in less time.   🎓 Why Choose Our Course?   ✅ Expert Guidance: Led by seasoned professionals, our instructors bring real-world experience to the virtual classroom.   ✅ Interactive Learning: Dive into hands-on activities, case studies, and quizzes to reinforce your understanding and make learning fun!   ✅ Lifetime Access: Enjoy unlimited access to course materials, ensuring you can revisit and reinforce your skills whenever you need.   ✅ Community Support: Join our exclusive community of learners. Share insights, ask questions, and network with like-minded individuals.   🔥 Don't Miss Out! 🔥   Transform the way you work, boost your team's efficiency, and elevate your career with 'Efficient Task Management Using Basecamp.' Embrace the future of productivity - Enroll Now!   Ready to revolutionize your workflow? Click the link to join the course and take the first step toward a more efficient, organized, and successful future! 🚀💻✨     Course Curriculum Basic Course Overview 00:00 The Three Versions of Basecamp 00:00 Mobile Installation of Version 2.0 00:00 Customizing Your Profile 00:00 Customizing Basecamp Settings 00:00 Project Creation 00:00 Project Discussions 00:00 To Do Lists 00:00 Project Documents 00:00 Project Management - Discussions 00:00 Project Management - Dates and Content 00:00 Project Notifications 00:00 Project Tracking 00:00 Project Calendars 00:00 Project Participants 00:00 Project Templates 00:00 Project Content 00:00 Project Navigation Shortcuts- Part 1 00:00 Project Navigation Shortcuts - Part 2 00:00 Conclusion 00:00 Advance Introduction and Overview of the Advanced Course 00:00 Working with Basecamp Groups 00:00 Working with Clients 00:00 Working with Outsourcers 00:00 Working with Non Basecamp Users 00:00 Integrating with Microsoft Outlook 00:00 Basecamp and Dropbox With Zapier 00:00 Basecamp and E-Mail Integraton with Zapier 00:00 Basecamp and Google Integration Through Zapier 00:00 Interface Strategy 00:00 Assembling The Team 00:00 Creating Groups 00:00 Creating To Do Lists 00:00 Content and Discussions Set Up 00:00 Creating And Using Templates 00:00 Setting Dates 00:00 Team Assignments 00:00 Tracking and Managing Progress 00:00 Removing and Adjusting Participants 00:00 Conclusion 00:00

Efficient Task Management Using Basecamp
Delivered Online On Demand1 hour 41 minutes
£25

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

SAPTEC Technology Fundamentals for SAP S/4HANA and SAP Business Suite

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System Administrators, System Architects, Database Administrators, Help Desk/COE Support, and Program/Project Managers. Overview Presentation in detail of the architecture of SAP NetWeaver Application Server (SAP NetWeaver AS).Learn effective techniques for navigating.Receive an overview of the development process in an SAP system landscape In this course, students gain knowledge about the fundamentals of SAP NetWeaver Application Server. SAP Systems Explaining the Key Capabilities of SAP NetWeaver Explaining the Architecture of an SAP System, Application Server (AS) ABAP and Application Server (AS) Java Navigation Basics Navigating with SAP Graphical User Interface (GUI) for Windows in AS ABAP Systems Navigating with a Browser in AS Java Systems System Core Explaining AS ABAP and AS Java System Architecture Identifying the Processes of an AS ABAP System Processing User Requests in AS ABAP Using Additional Processes of an AS ABAP System Explaining the Processes of an AS Java System Software Development in SAP Systems Outlining the Data Structure of an AS ABAP System Managing Transports in the ABAP Environment Explaining ABAP Workbench Tools Developing and Transporting an ABAP Repository Object Developing Applications in AS Java Developing Applications in Eclipse for ABAP Communication and Integration Technologies Describing Communication with Remote Function Call-Based (RFC) Technology Describing the Basics of Web Services Describing OData in SAP Gateway Application Lifecycle Management (ALM) Explaining Application Lifecycle Management (ALM) Describing the Installation of an SAP System Describing the Maintenance of an SAP System SAP Portfolio Overview Identifying the Platform, Database, and User Experience in the SAP Technology Portfolio Outlining Additional Components of the SAP Technology Portfolio Identifying the Components of the SAP Applications Portfolio SAP User Interfaces Accessing AS ABAP Systems with SAP GUI Accessing SAP Systems Using Other User Interfaces Additional Information Sources Accessing the SAP Service Marketplace (SMP) Accessing the SAP Community Network (SCN)

SAPTEC Technology Fundamentals for SAP S/4HANA and SAP Business Suite
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Python Programming for Non Programmers Level 5

4.5(3)

By Studyhub UK

Welcome to 'Python Programming for Non Programmers Level 5,' a course specially designed for those new to the world of coding. This program starts with a comprehensive introduction to Python, a versatile programming language favored in numerous fields. Progressing to the second unit, participants will familiarize themselves with the initial steps of Python programming, setting a strong foundation for future learning. The course then advances to conditional branching in Python, an essential skill for logical problem-solving in coding. A highlight of this course is the practical project: building the game 'Rock Paper Scissors'. This engaging task not only consolidates learning but also adds a fun element to the process. The curriculum further includes critical topics like string operations, date and time functionalities, and the nuances of file handling in Python. Learners will navigate through the complexities of Python data structures-tuples, lists, and dictionaries-and learn to craft user functions, enhancing their coding capabilities. The course also covers email automation, ingenious import tactics, interfacing with operating systems, and handling exceptions with finesse. Furthermore, learners will get hands-on experience with package installation, scheduling tasks in Python, and managing databases using SQLite. The course wraps up with insights on running Python programs via command prompt and Jupyter Notebook, ensuring learners are well-equipped for real-world applications. Learning Outcomes Acquire foundational knowledge and setup skills in Python programming. Master conditional branching for effective problem-solving in code. Complete a practical coding project to solidify Python skills. Learn essential Python operations, including string handling and file management. Explore and apply advanced Python concepts for real-world applications. Why choose this Python Programming for Non Programmers Level 5 course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Python Programming for Non Programmers Level 5 course for? Beginners eager to learn Python from scratch. Non-technical professionals desiring to add coding skills to their portfolio. Educators keen to integrate Python into their teaching methodologies. Businesspersons interested in understanding coding fundamentals for tech-based solutions. Enthusiasts exploring programming as a new hobby or career path. Career path Entry-Level Python Programmer: £25,000 - £40,000 Python-Enabled Data Analyst: £28,000 - £45,000 Python Automation Engineer: £30,000 - £50,000 Technical Support Analyst with Python Skills: £22,000 - £35,000 Python Web Developer: £26,000 - £42,000 Quality Assurance Analyst with Python Expertise: £24,000 - £38,000 Prerequisites This Python Programming for Non Programmers Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Python Programming for Non Programmers Level 5 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: Introduction to Python Programming Section 01: Course Introduction 00:02:00 Unit 02: Getting Started with Python Section 01: Software Installation 00:02:00 Section 02: Hello World Program 00:06:00 Section 03: Input and Output 00:07:00 Section 04: Calculating Average of 5 Numbers 00:03:00 Unit 03: Conditional Branching with Python Section 01: If Loop In Python 00:06:00 Section 02: Program Using If Else part 1 00:03:00 Section 03: Program Using If Else part 2 00:08:00 Section 04: Program for Calculator 00:02:00 Section 05: Program Using For Loop 00:08:00 Section 06: For Table 00:05:00 Section 07: For loop and Mathematical Operator in Python 00:04:00 Section 08: Factorial of Number Using Python 00:06:00 Section 09: Program Using While 00:05:00 Section 10: While Loop Example 00:07:00 Section 11: Tasks for Practice 00:02:00 Unit 04: Importing external/internal library in python Section 01: Importing Library in Python 00:07:00 Unit 05: Project Rock Paper and Scissors Section 01: Rock Paper and Scissor Game 00:06:00 Unit 06: Strings Operation in Python Section 01: Program Using String part 1 00:05:00 Section 02: Program using String 2 00:06:00 Section 03: Program Using String 3 00:06:00 Section 04: Program Using String part 4 00:03:00 Unit 07: Date and time in Python Section 01: Use of Date and Time part 1 00:05:00 Section 02: Use of Date and Time part 2 00:05:00 Unit 08: File Handling, read and write using Python Section 01: File Handling Part 1 00:08:00 Section 02: File Handling Part 2 00:07:00 Unit 09: Data Storage Structures, Tuple, List and Dictionary Section 01: Tuple in Python Part 1 00:10:00 Section 02: Tuple in Python Part 2 00:07:00 Section 03: Using Lists part 1 00:07:00 Section 04: Using List part 2 00:12:00 Section 05: Using Lists part 3 00:06:00 Section 06: Using Lists part 4 00:08:00 Section 07: Using Lists part 5 00:02:00 Section 08: Use of Dictionary Part 1 00:04:00 Section 09: Use of Dictionary Part 2 00:05:00 Section 10: Use of Dictionary Part 3 00:08:00 Section 11: Use of Dictionary Part 4 00:07:00 Unit 10: Writing user functions in Python Section 01: Function in Python Part 1 00:06:00 Section 02: Function in Python Part 2 00:05:00 Section 03: Function in Python Part 3 00:04:00 Section 04: Function in Python Part 4 00:07:00 Section 05: Function in Python Part 5 00:08:00 Unit 11: Sending mail Section 01: Send Email 00:09:00 Unit 12: Import Tricks in Python Section 01: Import Study part 1 00:07:00 Section 02: Import Study part 2 00:03:00 Unit 13: Import Operating System and Platform Section 01: Importing OS 00:06:00 Section 02: Import Platform 00:05:00 Unit 14: Exceptions handling in python Section 01: Exception in Python part 1 00:11:00 Section 02: Exception in Python part 2 00:07:00 Section 03: Exception in Python part 3 00:05:00 Unit 15: Installing Packages and Scheduling In Python Section 01: Installing Packages using built in package manager 00:08:00 Section 02: Scheduler in Python 00:05:00 Unit 16: Data Base In Python using sqlite Section 01: Data Base 1 00:08:00 Section 02: Data Base 2 00:09:00 Section 03: Data Base 3 00:08:00 Section 04: Data base 4 00:07:00 Section 05: Data Base 5 00:06:00 Unit 17: Running Program from Command Prompt and jupyter Notebook Section 01: IDE_1 00:05:00 Section 02: IDE_2 00:07:00 Unit 18: Conclusion Section 01: Conclusion 00:02:00 Resources Resources - Diploma in Python Programming 00:00:00 Assignment Assignment - Diploma in Python Programming 00:00:00 Recommended Materials Workbook - Diploma in Python Programming 00:00:00

Python Programming for Non Programmers Level 5
Delivered Online On Demand5 hours 58 minutes
£10.99

Learn C# by Building Applications.

By Packt

With this course, you will learn the bare-bone basics of C# by building console applications from scratch. You will first develop the application and then test it to gain a solid understanding of C# fundamentals. You will also explore the latest features released in C# 7.

Learn C# by Building Applications.
Delivered Online On Demand13 hours 23 minutes
£74.99

SQL Complete Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

SQL Complete Training
Delivered Online On Demand2 hours 33 minutes
£25

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19

Ansible for the Absolute Beginner - Hands-On - DevOps

By Packt

Unlock the power of Ansible in DevOps with this in-depth video course. From beginner to expert, this course covers everything you need to know about Ansible, accompanied by hands-on exercises that you can practice right in your browser. No prior experience needed.

Ansible for the Absolute Beginner - Hands-On - DevOps
Delivered Online On Demand2 hours 33 minutes
£74.99