• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10754 Mac courses

Quick hitch awareness

By Bolster Training Ltd

Operators will learn safe use of the Quick Hitch, perform checks, maintain PPE, and follow shutdown procedures to ensure equipment safety.

Quick hitch awareness
Delivered In-Person in Bodmin + 13 moreFlexible Dates
Price on Enquiry

Rear tipping dumper - articulated dump truck (ADT)

By Bolster Training Ltd

Operate a rear tipping dumper by understanding risks, following safety checks, using PPE, navigating terrains, handling loads, and completing shutdown tasks.

Rear tipping dumper - articulated dump truck (ADT)
Delivered In-Person in Bodmin + 13 moreFlexible Dates
Price on Enquiry

Free Plagiarism Checkers for PowerPoint

By John smith

Have you ever worried about accidentally using someone else's work in your PowerPoint presentations without proper attribution? Or maybe you want to ensure your academic or professional slides are original and free of plagiarism. Maintaining originality is crucial in both academic and professional settings, and that's where free plagiarism checkers for PowerPoint come to the rescue. These tools help you ensure that your presentations are authentic and that all sources are correctly cited. What is a Plagiarism Checker for PowerPoint? A plagiarism checker for PowerPoint is a digital tool designed to scan the content of your slides for any instances of plagiarism. It compares your text, images, and other content against a vast database of sources to identify any potential matches. These tools use algorithms and extensive databases of web pages, academic papers, and other published content to identify similarities between your presentation and existing sources. Advanced tools may also use artificial intelligence to detect paraphrased content that still closely resembles the original source. Why Use Free Plagiarism Checkers for PowerPoint? Not everyone has the budget for premium plagiarism detection software. Free tools offer a cost-effective solution for students, educators, and professionals who need to ensure their work is original. Most free plagiarism checkers are available online and can be used directly from your browser, without needing any downloads or installations. This makes them a convenient option for quick checks, whether you're at home, at work, or on the go. Features to Look for in a Plagiarism Checker for PowerPoint The most important feature of a plagiarism checker is its ability to accurately detect copied content. Look for tools with high detection rates and comprehensive databases. A good plagiarism checker should be easy to use, with a simple interface that allows you to quickly upload your PowerPoint files and get results without hassle. Consider whether the plagiarism checker integrates with other platforms you use, such as Microsoft Office, Google Drive, or cloud storage services. Some plagiarism checkers offer customization options, such as choosing the database they scan against or adjusting the sensitivity of the checker. These features can be useful if you have specific needs, like checking against academic databases or avoiding self-plagiarism. How to Use Online Plagiarism Checkers for PowerPoint Effectively Start with the best possible version of your PowerPoint presentation. Ensure that all quotes, data, and images are correctly cited before running the plagiarism check. After running your presentation through the plagiarism checker, carefully review the report. Check any flagged content and make necessary revisions to ensure your work is original and properly attributed. Once you've addressed any potential issues, make a final pass through your presentation to refine your slides and ensure clarity and originality. Benefits of Using Plagiarism Checkers Using plagiarism checkers helps maintain academic integrity by ensuring your work is original and that all sources are properly cited, which is crucial for students and researchers. In the professional world, originality is key. Plagiarism checkers help ensure that your presentations reflect your own work and ideas, boosting your credibility. Plagiarism checkers save you time by quickly identifying potential issues, allowing you to focus on refining your content instead of manually checking for plagiarism. Potential Drawbacks of Free Plagiarism Checkers Free plagiarism checkers may have limitations in their databases, potentially missing some sources or failing to detect more sophisticated forms of plagiarism, like paraphrasing. Uploading your PowerPoint presentations to online tools may raise privacy concerns, especially if they contain sensitive or proprietary information. Always ensure the tool you use has a robust privacy policy. Relying too heavily on plagiarism checkers can reduce your vigilance in ensuring originality. It's essential to balance using these tools with your own checks and citations. Plagiarism Checker Tools for Different Needs For academic purposes, tools like MyAssignmentHelp's plagiarism checker offer advanced features tailored to academic writing, ensuring your research is properly cited and free of plagiarism. Professionals can benefit from plagiarism checkers that provide comprehensive scanning and detailed reports, helping to maintain a high standard of originality in corporate presentations. For casual or personal presentations, simpler tools may suffice, offering basic checks to ensure your slides are free from unintentional plagiarism. The Future of Plagiarism Checking Technology Advances in AI and machine learning are continually improving the capabilities of plagiarism checkers, making them more accurate and user-friendly. Future developments may include better integration with presentation software, real-time scanning features, and enhanced support for multimedia content in presentations. Conclusion In today's digital age, ensuring originality in your PowerPoint presentations is more important than ever. Free plagiarism checkers provide a valuable service, helping you maintain academic and professional integrity. While they have their limitations, their benefits make them an essential tool for anyone creating presentations. FAQs Free plagiarism checkers are generally reliable for basic checks, but they may not catch all instances of plagiarism or offer as detailed feedback as premium versions. While plagiarism checkers are a helpful aid, they cannot replace the need for manual citation and proper attribution. Always review and cite your sources carefully. Most reputable plagiarism checkers, like MyAssignmentHelp, have privacy policies in place to protect user data. However, it's always wise to avoid uploading sensitive or confidential presentations to online tools. Some plagiarism checkers offer limited support for multimedia content, such as images and videos. However, text-based content remains their primary focus. Yes, tools like MyAssignmentHelp's plagiarism checker offer features tailored to academic presentations, helping you ensure your slides are original and properly cited.

Free Plagiarism Checkers for PowerPoint
Delivered In-PersonFlexible Dates
FREE

qriscila

By qriscila

Học IT có khó không? Cơ hội và thách thức với ngành lập trình Ngành công nghệ thông tin (IT) luôn thu hút nhiều bạn trẻ bởi sự phát triển mạnh mẽ và tiềm năng vô tận. Tuy nhiên, câu hỏi mà nhiều người đặt ra là "Học IT có khó không?" và liệu ngành lập trình có thực sự là lựa chọn phù hợp? Bài viết này sẽ giúp bạn hiểu rõ hơn về những cơ hội và thách thức trong ngành lập trình. Học IT có khó không? Học IT đặc biệt là lập trình, không phải là điều dễ dàng, nhưng cũng không phải là điều quá khó nếu bạn có sự đam mê và kiên trì. Để trở thành một lập trình viên giỏi, bạn cần nắm vững các kiến thức về ngôn ngữ lập trình, thuật toán, cấu trúc dữ liệu, và cơ sở dữ liệu. Tuy nhiên, điều quan trọng nhất là khả năng tự học và giải quyết vấn đề. IT là lĩnh vực không ngừng phát triển, FPT Aptech - Hệ thống đào tạo lập trình viên quốc tế và việc cập nhật kiến thức là điều không thể thiếu. Học lập trình game trong 2 năm Cơ hội trong ngành lập trình Ngành lập trình mở ra nhiều cơ hội cho những ai có đam mê và quyết tâm. Nhu cầu nhân lực cao: Với sự bùng nổ của công nghệ, nhu cầu tuyển dụng lập trình viên ngày càng tăng. Các công ty luôn tìm kiếm những nhân tài có khả năng phát triển phần mềm, ứng dụng di động, và các hệ thống thông minh. Thu nhập hấp dẫn: Ngành lập trình được biết đến với mức thu nhập cao và chế độ đãi ngộ tốt. Đây là một trong những ngành nghề có mức lương khởi điểm cao nhất, và nếu bạn có kinh nghiệm và kỹ năng chuyên môn, cơ hội thăng tiến và tăng thu nhập là rất lớn. Khóa học lập trình game full-stack tại FPT Aptech mở rộng tuyển sinh Thách thức trong ngành lập trình Bên cạnh những cơ hội, ngành lập trình cũng có những thách thức mà bạn cần đối mặt. Áp lực công việc: Làm việc trong ngành lập trình đôi khi rất căng thẳng do yêu cầu cao về chất lượng và tiến độ. Bạn sẽ phải liên tục làm việc với các deadline, đồng thời phải đảm bảo sản phẩm của mình không có lỗi. Cạnh tranh gay gắt: Mặc dù nhu cầu nhân lực cao, nhưng sự cạnh tranh trong ngành lập trình cũng rất khốc liệt. Bạn cần không ngừng nâng cao kỹ năng và kiến thức để không bị tụt hậu so với đồng nghiệp. Học IT và trở thành lập trình viên không hề dễ dàng, nhưng nếu bạn có đam mê, kiên trì, và tinh thần cầu tiến, đây sẽ là một ngành nghề mang lại nhiều cơ hội phát triển. Với những chương trình đào tạo bài bản từ FPT Aptech, bạn sẽ được trang bị đầy đủ kiến thức và kỹ năng cần thiết để bước vào thế giới công nghệ đầy tiềm năng này. Đừng quên theo dõi để cập nhật những thông tin mới nhất về ngành IT và các khóa học tại FPT Aptech.

qriscila
Delivered In-PersonFlexible Dates
FREE

Online Options

Show all 10291

Beginner to Boss

By Homeopathic Harmony

As a qualified homeopath of 5yrs, I've put together a brilliant offer for newly-qualified homeopaths who know all about remedies but almost nothing about running a successful, busy homeopathy practice. Very limited spaces, and the last time it will be this cheap before prices go up. You'll get a mix of group learning and direct access to me (learning from my mistakes so you don't have to waste time and money on making the same!).

Beginner to Boss
Delivered Online + more
£375

SOLD OUT! 26th November Sarah Williams #Agent121. Looking for: ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION Sarah Williams is a Director of the Sophie Hicks Agency which she joined in 2014 and she has worked as a literary agent for over 10 years. Sarah represents a wide range of adult fiction and non-fiction and as she runs the film and television side of the agency, she is particularly interested in books that have screen potential. She is looking for literary fiction, reading group fiction, memoir and lifestyle/personal development - basically any book that can surprise, change and challenge a reader. Recent favourites are Tides by Sara Freeman, The Paper Palace by Miranda Cowley Heller, Early Morning Riser by Katherine Heiney and In The Dream House by Carmen Maria Machado. Sarah would like you to submit a covering letter, 1 page synopsis and the first 20 - 30 pages of your manuscript in a single word document. (In addition to the paid sessions, Sarah is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 19 November 2024

SOLD OUT! 26th November Sarah Williams #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

Certified Data Centre Environmental Sustainability Specialist (CDESS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and has the responsibility to achieve and improve efficiency and environmental sustainability, whilst maintaining the availability and manageability of the data centre. Overview After completion of the course the participant will be able to: Understand the impact of data centres on the environment Describe the various environmental/energy management standards Understand the purpose and goals of the legally binding international treaties on climate change Implement various sustainable performance metrics and how to use them in the data centre environment Manage data centre environmental sustainability using international standards Set up the measurement, monitoring and reporting of energy usage Use power efficiency indicators in a variety of data centre designs Use best practices for energy savings in the electrical infrastructure and in the mechanical (cooling) infrastructure Use best practices for energy savings for the ICT equipment and data storage Understand the importance of water management and waste management Understand the different ways to use sustainable energy in the data centre Get practical tips and innovative ideas to make a data centre more sustainable The CDESS© course is aimed at providing knowledge of the standards and guidelines related to environmental sustainability, and how to move your data centre (existing or new) to a more environmentally sustainable design and operations. Impact of Data Centres on the Environment Predictions in 2010 Current situation Outlook and commitments What is Environmental Sustainability The importance of sustainability Senior management commitment Environmental sustainability framework Sustainability policies Performance standards and metrics Information policies Transparency Awareness Service charging models Environmental Management Environmental sustainability framework (ISO 14001) Standards and guidelines ? ISO 50001 / ISO 30134 Measurement and categories Baselining Trend analysis Reporting Power Effiðciency Indicators Various eðfficiency indicators Power Usage Effectiveness (PUE) PUE measurement levels Factors affecting PUE Measurement points and intervals PUE in mixed source environments Measuring PUE in a mixed-use building PUE reporting Impact of PUE after optimising IT load Electrical Energy Savings (Electrical) Identifying the starting point for saving energy Sizing of power DC power Generators UPS systems Power Factor (PF) Energy savings on lighting Electrical Energy Savings (Mechanical) Energy savings on the cooling infrastructure Temperature and humidity setpoints Various energy eðcient cooling technologies Energy savings on the airflow Liquid cooling Energy reusage PUE, ERE/ERF and Control Volume Electrical Energy Savings (ICT) Procurement IT equipment energy eðfficiency ITEEsv, SMPE, SMPO IT equipment utilisation Server virtualisation Open compute project Electrical Energy Savings (Data Storage) Data management Data storage management Data storage equipment effiðciency Water Management Water Usage Effectiveness (WUE) Improving WUE Water usage at the power generation source Energy Water Intensity Factor (EWIF) Waste Management Waste management policies Life-cycle assessment (Cradle to the grave) 3 R?s for waste management Reduce Reuse Second-hand market Recycle Sustainable Energy Usage Sustainable energy sources Power purchase agreements Energy attribute certificates Renewable Energy Factor (REF) Matching renewable energy supply and demand Sustainable energy storage Carbon trading Automated Environmental Management Systems Use of AI and machine learning Load migration Data Centre Infrastructure Management (DCIM) solutions

Certified Data Centre Environmental Sustainability Specialist (CDESS)
Delivered Online
£1,500

Data Analytics BootCamp, 12-weeks, Online Instructor-led

4.6(12)

By PCWorkshops

PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.

Data Analytics BootCamp, 12-weeks, Online Instructor-led
Delivered Online + more
£1,200

Excel - Automating Excel with Macros and Analysis Tools

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. Working with Multiple Worksheets and Workbooks Working with Named Ranges Link Cells Across Worksheets and Workbooks Use 3D References to Calculate Across Worksheets Consolidate Data Use Formula Auditing and Error Checking Reveal Formulas Trace Cell Precedents and Dependents Locate Errors in Formulas Watch and Evaluate Formulas Reviewing and Protecting Workbooks Control Data Entry via Data Validation Protect Workbook Access Protect Worksheets and Cell Content Add and Edit Comments Prepare a Workbook for Distribution Modify Excel's Default Settings Using Macros to Automate Workbook Functionality Create Macros via Recording Run Macros via Buttons and Shortcuts Assign Macros to the Quick Access Toolbar and Ribbon Assign Macros to Objects View Macro Code Forecasting and Analysis Data Use Conditional Formatting to Highlight, Sort and Filter Key Data Advanced Conditional Formatting using Formulas Create Sparklines to Visualise Data Add Trendlines to Charts to Visualise and Forecast Trends Use Data Tables and Scenarios to Project Potential Outcomes Use Goal Seek to Calculate Outcomes Forecast Data Trends Using Solver

Excel - Automating Excel with Macros and Analysis Tools
Delivered Online
£197

MAC Operating Course

4.3(43)

By John Academy

Are you new to mac? Want to learn how to operate a mac? Want to learn the tips and tricks of having fun with mac? If yes then enrol now to benefit the most out of this course. Description: This course is designed for individuals who are willing to switch from PC to Mac. Mac is continuously bringing up more inventive thoughts to incorporate into the present elements available. In this course, you will have an overview of the Mac desktops and the features that makes it more convenient then other systems. In this course, you will learn how to operate mac using the simplest method. You will also learn about networking process for Mac and how can user network 2 or more macs without any underlying issues usually related to other networking practices. Through this course, you will learn about many other interesting things you can do easily. Our professional, as well as experienced tutors, will make this course more fun and informative. Who is the course for? This course is designed for individuals who are interested in exploring the benefits of using MAC. It is also beneficial for the graphic designers as Mac system is preferable for handling the graphic software. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment:  At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: MAC Operating Course is a useful qualification to possess, and would be beneficial for the following careers: Mac operator. Production artist. Pre-press technician. Graphics designer. Creative art worker. Gamers. Video editors. Chapter-01 Introduction to Mac 01:00:00 Chapter-02 Features of Mac Desktops 01:00:00 Chapter-03 Networking System of Mac 01:00:00 Chapter-04 Types of Mac 01:00:00 Chapter-05 Mac your way to cyberspace 00:30:00 Chapter-06 Benefits of Using Mac 01:00:00 Chapter-07 How to print & fax using Mac 01:00:00 Chapter-08 Managing music with iTunes 01:00:00 Chapter-09 Having fun with photos 01:00:00 Chapter-10 Wrapping Up 00:15:00 Mock Exam Mock Exam- MAC Operating Course 00:20:00 Final Exam Final Exam- MAC Operating Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

MAC Operating Course
Delivered Online On Demand9 hours 25 minutes
£18

MAC Operating System Accredited Training

By iStudy UK

Are you a MAC user and want to increase your knowledge on the MAC operating system? Enroll in our MAC Operating System Accredited Training for a better understanding and adaptability of such complex OS. Course Description: The course is designed for the new MAC users. MAC OS continuously brings more creative thoughts to incorporate into the present elements available. In the course, you will learn the features of MAC desktop operating System and will be able to know the differences between MAC OS and other operating systems. Why makes MAC OS is more user-friendly and convenient to use will be discussed here. If you want to be an expert user of MAC OS, the course will surely guide you to learn all the necessary features and functions of MAC OS. The course not only covers the basics operating system of MAC but also provides detailed information about the networking process of MAC. By the end of the course, you will be confident enough to use MAC OS. Course Highlights MAC Operating System Accredited Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed MAC Operating System Accredited Training into 10 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 8 hours, 45 minutes hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose MAC Operating System Accredited Training Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? MAC Operating System Accredited Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our MAC Operating System Accredited Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Chapter-01 Introduction to Mac 01:00:00 Chapter-02 Features of Mac Desktops 01:00:00 Chapter-03 Networking System of Mac 01:00:00 Chapter-04 Types of Mac 01:00:00 Chapter-05 Mac your way to cyberspace 00:30:00 Chapter-06 Benefits of Using Mac 01:00:00 Chapter-07 How to print & fax using Mac 01:00:00 Chapter-08 Managing music with iTunes 01:00:00 Chapter-09 Having fun with photos 01:00:00 Chapter-10 Wrapping Up 00:15:00 Mock Exam Final Exam

MAC Operating System Accredited Training
Delivered Online On Demand8 hours 45 minutes
£25

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Introduction to ECG Course (GPT009)

4.6(39)

By Geopace Training

Learn how to perform and read an ECG ... Nationally Recognised Qualification OCN Accredited - Level 3 (advanced level) CPD Accredited - The CPD Certification Service Introduces you to the fundamentals of setting up and operating an ECG machine Includes patient preparation Produce a valid (error free) ECG Learn and understand ECG traces Recognise recordings that require urgent attention Basic understanding of English language required OPEN TO ALL APPLICANTS VIRTUAL CLASSROOM OPTION INCLUDES COMPREHENSIVE PRACTISE@HOME ECG TRAINING KIT Final interpretation of all ECG recordings is the responsibility of a medical professional.

Introduction to ECG Course (GPT009)
Delivered in Milton Keynes + 2 more or Online + more
£195

Mac Support for PC Technicians

By Influential Training

Mac Support for PC, PC and Mac Support, PC to Mac support

Mac Support for PC Technicians
Delivered OnlineFlexible Dates
£1,045

Educators matching "Mac"

Show all 580