• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

611 Linux courses

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)

By Packt

The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)
Delivered Online On Demand14 hours 39 minutes
£261.99

Kotlin for Android: Beginner to Advanced

By Course Cloud

Course Overview Kotlin is one of the most widely used Android app development programming languages, used by the world's most powerful companies, including Google, Facebook and Microsoft. The Kotlin for Android: Beginner to Advanced course will teach you the A-Z of Kotlin applications and how to program them. Starting from the very basics, it will guide you step-by-step through the installation procedures for Windows, Mac, and Linux, as well as the process for building an Android app using Kotlin programming language. This practical training course is ideal for aspiring Android developers, software engineers and anyone looking to learn how to program Kotlin applications through the guidance of an expert. Fast track your career today and add value to your resume with an industry-recognised certificate. This best selling Kotlin for Android: Beginner to Advanced has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Kotlin for Android: Beginner to Advanced is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Kotlin for Android: Beginner to Advanced is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Kotlin for Android: Beginner to Advanced is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Kotlin for Android: Beginner to Advanced, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Kotlin for Android: Beginner to Advanced will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Kotlin for Android: Beginner to Advanced to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Kotlin for Android: Beginner to Advanced
Delivered Online On Demand
£319

Digital Forensics for Pentesting Course

4.3(43)

By John Academy

Course Overview Won't it be great if you could recover your lost data from your device or ensure that the hackers cannot reach you? What about tracking the hacker and get back the data they have stolen from you? Digital security has become one of the greatest concerns today. Learn how you can secure your device and find out black hat hacker criminals from this Digital Forensics for Pentesting Course and ensure data security. In this Digital Forensics for Pentesting Course, you will learn the importance of digital forensic investigation, the basics of cybersecurity, pentesting and digital forensic. You'll understand the functions of Malware and how to track them back. This course is ideal for understanding how digital devices can be hacked and how to prevent them. You will be able to understand digital forensic investigation steps with easily understandable and bite-sized lessons. Learning Outcomes Get a clear understanding of what digital forensic investigation is Be able to produce professional and legal digital forensic reports Learn to utilise various forensic tools for digital forensic investigation Properly handle digital media during the investigation Recover deleted data from various devices and operating systems Be able to track hackers malicious movement Who is this course for? This course will be helpful for anyone who wants to learn about pentesting and interested in digital forensic investigation. You will learn how to understand digital forensic investigation step by step from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Digital Forensics for Pentesting Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Digital Forensic Investigators Pentesters Data Security Officers White Hat Hackers Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Lab - Installing CSI Linux 00:13:00 Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Lab - Create a Virtual Install Kali Image Using VirtualBox 00:07:00 Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Install Additional Tool Using Katoolin3 00:10:00 Using Kali Forensic Mode and Autopsy Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Lab -Digital Forensics Using Autopsy Part I 00:11:00 Lab - Digital Forensics Using Autopsy Part II 00:07:00 Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source intelligence (OSINT) Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Lab - Find Social Media Accounts Using Sherlock 00:07:00 Computer Forensics Attaching an External USB Device in Kali 00:07:00 Lab - Memory Forensics Using the Volatility Framework 00:18:00 Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Lab - Analyzing the Windows Registry for Evidence 00:14:00 Using Shodan to Search for Vulnerable devices Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Stenography Lab - Using the EXIFtool to Read and Write EXIF Tags 00:11:00 Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network forensics Using Wireshark Overview of Wireshark 3.2 00:11:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:04:00 Lab - Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Lab - Installing a Wireless Adapter in Kali 00:09:00 Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Have learned Lab - CTF Lab Build for HA: Forensics 00:11:00 Lab - Capture flag #1 00:12:00 Lab - Capture flag #2 00:10:00 Lab - Capture flag #3 00:20:00 Lab - Capture flag #4 00:09:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Digital Forensics for Pentesting Course
Delivered Online On Demand5 hours 39 minutes
£18

cPanel Complete Guideline installation and configuration

4.3(43)

By John Academy

Course Overview Whether you want to become a web developer or a web host having an adequate understanding of cPanel is a must. The cPanel Complete Guideline installation and configuration is here to assist you in acquiring the skills and ability to use cPanel to manage a wide number of websites, email accounts and other essential aspects of web hosting. The cPanel Complete Guideline Installation and Configuration course is packed with theoretical and practical information on cPanel. In this course, you will get introduced to the cPanel configurations and learn how to install cPanel on the server. From the easy to follow module, you will pick up the skills and expertise to install PHP extensions, Nginx and Firewall. Here, you will receive a detailed lecture on SSH security configurations. This course will help you comprehend the process of automatic backup. Within a few steps, you will earn enough expertise for WordPress installation. The cPanel Complete Guideline installation and configuration course is a complete package built to equip you with practical cPanel skills. Join the course today and increase your employability in the relevant industry. Learning Outcomes Familiarize yourself with the steps of installing cPanel on the server Build an understanding of basic cPanel configurations Learn how to install PHP extensions Enrich your knowledge of SSH security configurations Understand the process of installing WordPress on cPanel Who is this course for? The cPanel Complete Guideline Installation and Configuration course is for individuals who want to learn about cPanel software  Entry Requirement Basic Linux Knowledge Basic understanding of web development and web hosting This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The cPanel Complete Guideline Installation and Configuration course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Web designers Web developers Web Host Module 01: Introduction Introduction 00:10:00 Module 02: Setup Server and Connect to SSH Setup Server and Connect to SSH 00:12:00 Module 03: Installing cPanel on the Server Installing cPanel on the Server 00:09:00 Module 04: Explain Domain Records and Hostname Explain Domain Records and Hostname 00:06:00 Module 05: Basic cPanel Configuration Basic cPanel Configuration 00:19:00 Module 06: Notices About Auto Hostname ssl Notices About Auto Hostname ssl 00:03:00 Module 07: SSH Security Config SSH Security Config 00:09:00 Module 08: Encrypt ssl Plugin Encrypt ssl Plugin 00:05:00 Module 09: PHP Security and Configuration PHP Security and Configuration 00:08:00 Module 10: Installing PHP Extensions Installing PHP Extensions 00:16:00 Module 11: Apache Web server Configuration Apache Web server Configuration 00:21:00 Module 12: Installing Nginx as a Reverse Proxy Installing Nginx as a Reverse Proxy 00:08:00 Module 13: Firewall Installation and Configuration Firewall Installation and Configuration 00:27:00 Module 14: Automatic Backup and Restore Automatic Backup and Restore 00:27:00 Module 15: Installing Wordpress on cPanel to Test Database Installing WordPress on cPanel to Test Database 00:13:00 Module 16: Upgrade to Cloudlinux Upgrade to Cloudlinux 00:17:00 Module 17: Cloudlinux and LVE Configuration Cloudlinux and LVE Configuration 00:06:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

cPanel Complete Guideline installation and configuration
Delivered Online On Demand3 hours 36 minutes
£18

Elegant Automation Frameworks with Python and Pytest

By Packt

Leverage pytest's fast, scalable, and professional-grade framework design to build and run automated test suites like a pro

Elegant Automation Frameworks with Python and Pytest
Delivered Online On Demand5 hours 49 minutes
£94.99

Bash Shell Scripting

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Bash Shell Scripting
Delivered Online On Demand4 hours 32 minutes
£25

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Introduction to Ansible: Automation with Ansible (TTDV7580)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an Introductory level course for experienced Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. Ideally students should have familiarity with basic Python scripting. Attendees without programming skills can follow along with the scripting portion of the labs. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert practitioner attendees will explore how to: Describe Ansible concepts and install Red Hat Ansible Engine (optional - we can pre-install is as well if desired, depending on the audience) Deploy Ansible and Configure Ansible to manage hosts and run ad hoc Ansible commands. Implement playbooks Write a simple Ansible playbook and run it to automate tasks on multiple managed hosts. Manage variables and facts Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts. Implement task control; Manage task control, handlers, and task errors in Ansible playbooks. Deploy files to managed hosts Deploy, manage, and adjust files on hosts managed by Ansible. Manage large projects Write playbooks that are optimized for larger, more complex projects. Simplify playbooks with roles Use Ansible roles to develop playbooks more quickly and to reuse Ansible code. Troubleshoot Ansible Troubleshoot playbooks and managed hosts. Automate Linux administration tasks Automate common Linux system administration tasks with Ansible This lab-intensive course is geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows. Throughout the course you will explore core Ansible features such as automatic provisioning, configuration management, service deployment and operational processes. Ansible Overview Overview of Architecture Overview of Deployments Inventory Deploying Ansible Installing Configuration Files Running Ad Hoc Commands Dynamic Inventory Playbooks Writing YAML Files Modules Variables and Inclusions Variables Facts Inclusions Task Control Constructing Flow Control Handlers Tags Handling Errors Jinja2 Templates Jinja2 Templates Jinja2 Templates Roles Role Structure Creating Roles Deploying Roles with Ansible Galaxy Optimizing Ansible Configuring Connection Types Configuring Delegation Configuring Parallelism Ansible Vault Configuring Ansible Vault Executing with Ansible Vault Troubleshooting Ansible Troubleshooting Playbooks Troubleshooting Managed Hosts Ansible Tower Ansible Tower overview Installing Account management Hosts Jobs Optional: Ansible in a DevOps Environment Provisioning Vagrant Machines Deploying Vagrant in a DevOps Environment Deploying Docker in a DevOps Environment Additional course details: Nexus Humans Introduction to Ansible: Automation with Ansible (TTDV7580) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Ansible: Automation with Ansible (TTDV7580) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Ansible: Automation with Ansible (TTDV7580)
Delivered OnlineFlexible Dates
Price on Enquiry

Ruby on Rails 5 - Become a Professional Developer

5.0(10)

By Apex Learning

Overview This comprehensive course on Ruby on Rails 5 - Become a Professional Developer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ruby on Rails 5 - Become a Professional Developer comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ruby on Rails 5 - Become a Professional Developer. It is available to all students, of all academic backgrounds. Requirements Our Ruby on Rails 5 - Become a Professional Developer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 23 sections • 225 lectures • 16:47:00 total length •Course Introduction: 00:06:00 •The Application We're Going to Build: 00:09:00 •Section Introduction gg: 00:01:00 •Introduction to the Command Line Interface in Mac and Linux: 00:10:00 •Installing the X-Code Command Line Tools for Mac: 00:02:00 •Installing Git for Source Code Version Control: 00:03:00 •How to install Homebrew on a Mac: 00:04:00 •Installing GPG Security Systems on a Mac: 00:02:00 •Guide to RVM for Ruby Management: 00:09:00 •Configuring RubyGems and Installing Rails: 00:07:00 •Installing the Postgres Database on a Mac: 00:05:00 •Installing and Working with the Sublime Text Editor: 00:17:00 •Deep Dive into the Command Line - Part 1 of 2: 00:14:00 •Deep Dive into the Command Line - Part 2 of 2: 00:12:00 •PC Environment Setup: Installing Virtual Box: 00:03:00 •Guide to Installing Ubuntu Linux in VirtualBox: 00:10:00 •How to Reboot a Linux Virtual Machine from Terminal: 00:02:00 •Installing Desktop Applications and Ubuntu Navigation Tips and Tricks: 00:09:00 •How to Sign Up for a GitHub Account: 00:03:00 •How to install Git on Linux and Connect to GitHub via SSH: 00:20:00 •How to Securely Install Node and NPM on Linux via NVM: 00:09:00 •Installing the Heroku CLI and the Full Deployment Lifecycle: 00:14:00 •How to install and Work with Sublime Text in Linux: 00:08:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 1 of 2: 00:10:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 2 of 2: 00:15:00 •Fixing the Role Does Not Exist Error: 00:05:00 •Section Introduction ee: 00:01:00 •Signing Up for a Project Management Account: 00:03:00 •Managing the Project Management Dashboard: 00:08:00 •Importing Project Management Tasks into Pivotal Tracker: 00:01:00 •Creating a Rails Application: 00:11:00 •Generating a Blog for the Portfolio Application Using Rails Scaffolds: 00:11:00 •Analyzing the Rails Process: Index and Show Actions: 00:12:00 •Analyzing the Rails Process: New, Create, Update, Edit, and Destroy Actions: 00:14:00 •Analyzing the Rails Process: Routing with Resources: 00:07:00 •Rails File System Overview: 00:13:00 •Updating the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing the Application Generator - Part 1: 00:12:00 •Deep Dive: Analyzing the Application Generator - Part 2: 00:17:00 •Section Introduction bb: 00:02:00 •How to Sign Up for a Github Account: 00:03:00 •Generating SSH Keys to Securely Communicate with Github: 00:04:00 •Guide to GitHub: 00:12:00 •How to Update a .gitignore File to Securely Store Secret Credentials: 00:11:00 •Guide to the Markdown Syntax: 00:10:00 •Updating the Git Sprint in the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing Version Control and Git - Part 1: 00:18:00 •Deep Dive: Analyzing Version Control and Git - Part 2: 00:13:00 •Section Introduction aa: 00:01:00 •Guide to the Rails Controller Generator to Build Pages Part 1: 00:16:00 •Guide to the Rails Controller Generator to Build Pages Part 2: 00:05:00 •Guide to the Rails Model Generator to Build out Data Specific Features: 00:17:00 •Guide to the Rails Model Generator for Building Out the Portfolio Feature: 00:10:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 1: 00:15:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 2: 00:11:00 •Section Introduction SS: 00:02:00 •Building out a Seeds File for Generating Dynamic Sample Data: 00:15:00 •Implement an Index Action from Scratch in Rails: 00:12:00 •Build the New and Create Functionality from Scratch in Rails: 00:20:00 •Implement the Ability to Edit Database Records from Scratch in Rails: 00:13:00 •How to Use the Link to Method in Rails for Creating Dynamic Links: 00:13:00 •How to Implement the Show Action from Scratch in Rails: 00:12:00 •Building the Ability to Delete Items in Rails: 00:15:00 •How to Implement Custom Routes for Pages in Rails: 00:09:00 •How to Override the Rails Resources Routes for the Show Action: 00:07:00 •How to Implement Permalinks in a Rails Application - Part 1: 00:17:00 •How to Implement Permalinks in a Rails Application - Part 2: 00:05:00 •How to Use Enums in Rails to Manage Data Stages: 00:13:00 •How to Implement a Custom Action in Rails via a Button Click - Part 1: 00:12:00 •How to Implement a Custom Action in Rails via a Button Click - Part 2: 00:10:00 •Updating the Project Management Dashboard and Performing a Pull Request: 00:05:00 •Deep Dive: Rails Routing and Data Flow - Part 1: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 2: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 3: 00:16:00 •Section Introduction RR: 00:01:00 •Implementing Data Validations in Rails 5: 00:12:00 •Guide to Data Relationships in Rails: 00:16:00 •How to Implement Custom Scopes in Rails 5: 00:16:00 •How to Set Default Values in Rails 5: 00:13:00 •How to Use Concerns in Rails 5: 00:13:00 •Building an Additional Parent/Child Relationship in Rails 5: 00:10:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Model: 00:17:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Form: 00:17:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 1: 00:16:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 2: 00:14:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 3: 00:15:00 •Section Introduction QQ: 00:01:00 •How to Install Devise in Rails 5: 00:08:00 •Using Devise to Implement Registrations and Login Functionality: 00:18:00 •Building Custom Routes for Authentication Pages with Devise in Rails 5: 00:03:00 •Enable Users to Logout and Dynamically Render View Content in Rails 5: 00:07:00 •How to Add Custom Attributes to a Devise Based Authentication System: 00:15:00 •How to Use Controller Concerns in Rails 5 for Devise Custom Attributes: 00:15:00 •Integrate Virtual Attributes to Extract First and Last Name Data from a User: 00:17:00 •Deep Dive: Using BCrypt to Implement Encryption in Ruby: 00:19:00 •Section Introduction PP: 00:01:00 •Rails Data Flow Review and Working with Params: 00:14:00 •Using Rails Sessions to Share Data between Pages: 00:19:00 •Refactoring the Session Tracker into a Controller Concern: 00:07:00 •Working with Strong Params in a Rails 5 Controller: 00:13:00 •Deep Dive: Building a Guest User Feature in Rails - Part 1: 00:14:00 •Deep Dive: Building a Guest User Feature in Rails - Part 2: 00:18:00 •Section Introduction OO: 00:03:00 •How to Customize the Rails Master Layout File - Part 1: 00:15:00 •How to Customize the Rails Master Layout File - Part 2: 00:09:00 •Guide to Using Multiple Layout Files in Rails 5: 00:14:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Introduction to Partials in Rails 5: 00:08:00 •How to Send Data to Partials to Generate Custom Behavior in Rails 5: 00:15:00 •Guide to View Helpers in Rails 5: 00:17:00 •How to Use the Rails Content Tag Helper to Auto Generate HTML Code: 00:15:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Guide to Manually Configuring Partials to Work with Collections in Rails: 00:07:00 •Guide to Helpful ActionView Helper Methods in Rails 5: 00:15:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 1: 00:12:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 2: 00:15:00 •Section Introduction NN: 00:01:00 •How to Utilize Puts Debugging in Rails: 00:08:00 •Guide to Byebug in Rails 5: 00:09:00 •Guide to Debugging with Pry in Rails 5: 00:19:00 •Proper Way to Implement Error Management in a Rails Application - Part 1: 00:15:00 •Proper Way to Implement Error Management in a Rails Application - Part 2: 00:06:00 •Section Introduction MM: 00:01:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 1: 00:10:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 2: 00:12:00 •Section Strategy for Building a Custom RubyGem: 00:11:00 •How to Build a RubyGem from Scratch - Part 1: 00:06:00 •How to Build a RubyGem from Scratch - Part 2: 00:15:00 •Section Introduction hh: 00:02:00 •Introduction to Authorization and How to Install the Petergate Gem: 00:08:00 •How to Add Roles to the User Model in Rails 5: 00:05:00 •Guide to Implementing Petergate in Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Petergate in Rails 5 Application - Part 2: 00:12:00 •Workplace Facilities: 00:35:00 •Portfolio Design Planning for Layout Specific Styles: 00:09:00 •Implementing the Initial Homepage Design in Rails 5 with Bootstrap 4: 00:09:00 •Building a Navigation Partial for the Master Application Layout with Bootstrap: 00:11:00 •Implement a Footer Along with Adding Method Arguments to a Rails View Helper: 00:14:00 •How to Embed a Google Map into a Rails Application: 00:06:00 •Guide to Updating the Styles for the Devise Edit Account Page in Rails: 00:16:00 •How to Override Default Bootstrap Styles for Text Alignment in the Card Class: 00:06:00 •Implementing Styles for the Devise Registration Page with Bootstrap 4: 00:14:00 •How to Design the Login and Password Pages with Bootstrap 4 Form Styles: 00:15:00 •How to Set Default Values for View Helper Method Arguments in Rails 5: 00:04:00 •Integrating a Different Design for a Separate Blog Layout in Rails 5: 00:04:00 •How to Use Bootstrap 4 to Add a Custom Nav Bar to a Blog Layout in Rails: 00:07:00 •Customizing the Design for the Blog Index Page with Bootstrap 4: 00:19:00 •Guide to Adding Styles to the Blog Show and Form Pages with Bootstrap 4: 00:12:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 1: 00:23:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 2: 00:23:00 •Initial Design for the Portfolio Index Page with Bootstrap 4: 00:17:00 •Integrating the Portfolio Animated Navigation Slider, Footer, and Index: 00:14:00 •Using the Bootstrap 4 Grid Layout to Style the Portfolio Show Page in Rails: 00:06:00 •Implementing Bootstrap 4 Forms for the Portfolio Form Pages: 00:13:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 1: 00:20:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 2: 00:19:00 •Deep Dive: Rails Asset Pipeline Part 1: 00:01:00 •Deep Dive: Rails Asset Pipeline Part 2: 00:19:00 •Section Introduction LL: 00:01:00 •How to Integrate a Position Attribute and Custom Scope in Rails: 00:12:00 •Installing the jQuery UI and html5sortable JavaScript Libraries in Rails 5: 00:09:00 •Initial Implementation of Drag and Drop Interface in Rails 5: 00:13:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 1: 00:18:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 2: 00:11:00 •Implementing Authorization Rules for Drag and Drop Feature with Petergate: 00:07:00 •Deep Dive: jQuery CoffeeScript in Rails: 00:19:00 •Section Introduction jj: 00:01:00 •Introduction to Using Images and the Rails Asset Pipeline: 00:12:00 •How to Set a Full Size Video Background in Rails with Bootstrap 4: 00:08:00 •Deep Dive: Installing and Configuring Carrierwave for Image Uploads in Rails 5: 00:20:00 •Deep Dive: Integrating Connection to AWS S3 for File Hosting with Carrierwave: 00:14:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 1: 00:06:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 2: 00:19:00 •Section Introduction ii: 00:01:00 •Difference Between form_form and form_tag in Rails - Part 1: 00:15:00 •Difference Between form_form and form_tag in Rails - Part 2: 00:16:00 •How to Integrate Cocoon in Rails 5 for jQuery Nested Forms: 00:20:00 •Guide to Integrating Alerts that Automatically Fade Away in Rails 5: 00:15:00 •Refactoring Alert Notifications to Use a Shared View Helper in Rails: 00:13:00 •Deep Dive: How to Build an HTML Form from Scratch the Works with Rails: 00:17:00 •Section Introduction ff: 00:03:00 •Integrating the Twitter Gem to Pull in Tweets in Rails 5: 00:20:00 •How to Render Tweets on a Rails View Page: 00:07:00 •Building a Parser View Helper Method to Make Twitter Links Clickable in Rails: 00:15:00 •Customizing the Styles for the Tech News Page with Bootstrap 4: 00:07:00 •Section Introduction cc: 00:01:00 •Running the Comment Generator and Installing the NoSQL Redis Database in Rails 5: 00:18:00 •Building the Comment Form and Required Controller Actions - Part 1: 00:14:00 •Building the Comment Form and Required Controller Actions - Part 2: 00:08:00 •Refactoring the Comment Form into a Partial and Implementing Data Validations: 00:05:00 •Building the jQuery Functions for Processing Comments - Part 1: 00:19:00 •Building the jQuery Functions for Processing Comments - Part 2: 00:05:00 •How to Create a Broadcast with ActionCable in Rails 5: 00:14:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 2: 00:06:00 •Styling the Comment Section and Implementing Gravatar Based Thumbnails in Rails: 00:16:00 •Section Introduction dd: 00:01:00 •Planning Final Project Updates and Assignment: 00:11:00 •Building a Scope to Show the Most Recent Blog Posts and Hiding Draft Posts: 00:09:00 •Hiding the Show Page for Blogs in Draft Mode in Rails 5: 00:04:00 •How to Add a Drop Down Form Element in Rails 5 for Parent/Child Relationships: 00:09:00 •Using the Controller Generator to Build the Topic Features - Part 1: 00:10:00 •Using the Controller Generator to Build the Topic Features - Part 2: 00:11:00 •How to Build a Widget for the Blog to Render Topics in Rails 5: 00:17:00 •How to Implement Radio Buttons in a Rails Form to Update Enum Values: 00:09:00 •Guide to Integrating Markdown and Syntax Highlighting in a Rails 5 Application: 00:13:00 •Integrating Breadcrumbs and Icons for the Blog Show Pages: 00:12:00 •Building a Partial for Managing Admin Actions for Blog Posts: 00:15:00 •How to Implement a Responsive Navigation Bar with Bootstrap 4: 00:11:00 •Updating the Source/Session Tracking System for the New Layouts: 00:14:00 •How to Integrate a Favicon in Rails 5: 00:08:00 •Implementing Responsive Image Components for the Portfolio Layout: 00:06:00 •Adding Card Styles to the About and Contact Pages: 00:09:00 •How to Implement Collapsable Content Components in a Rails 5 Application: 00:09:00 •How to Integrate Bootstrap Progress Bars in a Rails Application: 00:13:00 •How to Integrate Custom Fonts in a Rails 5 Application: 00:17:00 •Updating the Seeds File in Rails: 00:07:00 •Signing Up for and Creating a New Heroku Application: 00:04:00 •How to Deploy a Rails 5 Application to Heroku: 00:13:00 •Working with the Rails Console on Heroku: 00:11:00 •Installing Redis on Heroku for ActionCable Commenting Feature: 00:04:00 •Configuring Action Cable to Work on Heroku: 00:11:00 •How to Implement the Typed.js Library into a Rails 5 Application: 00:12:00 •How to Install and Configure Webpack, Yarn, and jQuery into a Rails 5.1+ App: 00:19:00 •How to Work with Encrypted Credentials in Rails 5.2+: 00:24:00

Ruby on Rails 5 - Become a Professional Developer
Delivered Online On Demand16 hours 47 minutes
£12

Computer Operating System Certificate Course

By iStudy UK

Operating system is a special purpose software that is used to manage the overall computer. It is the fundamental and building block of any working computer system. Thus, knowing about how to use computer operating systems is a must for any end user. Our course is designed to deliver you the fundamental knowledge related to operating a computer. It will also teach you the attributes that are very useful to make the computer functional. Besides that, you will get to know about the the standards and how to use them properly. Most importantly, you will get to learn about different types of operating systems including windows, Mac, Linux and Unix. If you think you are ready to understand how your computer works and how get the best out of your PC, then enrol and be a computer master in no time. Course Highlights Computer Operating System Certificate Course is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Computer Operating System Certificate Course into 13 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 9 hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Computer Operating System Certificate Course Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Computer Operating System Certificate Course is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Computer Operating System Certificate Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Introduction 00:15:00 What is an Operating System? 00:30:00 History of Operating System 00:30:00 What an Operating System Does 01:00:00 Microsoft Windows 01:00:00 MAC OS 01:00:00 UNIX 00:30:00 LINUX 00:30:00 GNU 00:30:00 Other Operating Systems 01:00:00 Installing an Operating System 01:00:00 Defining The Processes 01:00:00 Conclusion 00:15:00 Mock Exam Final Exam

Computer Operating System Certificate Course
Delivered Online On Demand9 hours
£25