• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

418 Operating Systems & Services courses in Edinburgh delivered On Demand

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

Windows 10 Jumpstart: A Beginner's Guide

By Compete High

🚀 Windows 10 Jumpstart: A Beginner's Guide 🚀 Are you ready to embark on a journey to master the most powerful and user-friendly operating system on the planet? Look no further! Introducing our groundbreaking online course: Windows 10 Jumpstart: A Beginner's Guide.   🔍 Unlock the Secrets of Windows 10: Dive headfirst into the Windows 10 universe with confidence! Our comprehensive course is designed for beginners, guiding you through every aspect of this dynamic operating system. Whether you're a complete novice or looking to enhance your skills, this course is your gateway to Windows 10 mastery.   🛠️ What You'll Learn: Getting Started: Navigate the Windows 10 interface effortlessly, from the Start Menu to the Desktop and beyond. Customization: Tailor Windows 10 to fit your needs with personalized settings, themes, and desktop configurations. Productivity Hacks: Unleash the full potential of Windows 10 with time-saving tips, keyboard shortcuts, and efficient multitasking techniques. Security Mastery: Safeguard your digital world with in-depth lessons on Windows Defender, firewalls, and essential security protocols. Troubleshooting Basics: Learn how to tackle common issues and optimize your system for peak performance.   🎓 Why Choose Our Course? Beginner-Friendly: No tech-speak here! We break down complex concepts into easy-to-understand lessons suitable for everyone. Interactive Learning: Engage with hands-on activities, quizzes, and practical exercises to reinforce your newfound knowledge. Lifetime Access: Enjoy unlimited access to the course material, allowing you to learn at your own pace and revisit lessons whenever you need a refresher. Expert Instructors: Our seasoned instructors are passionate about empowering you with the skills you need to navigate Windows 10 like a pro.   💡 Don't Miss Out on This Opportunity to Master Windows 10! Whether you're a student, professional, or tech enthusiast, Windows 10 Jumpstart: A Beginner's Guide is your ticket to unlocking the full potential of your computer. Enroll today and embark on a transformative learning experience! Course Curriculum Basic Overview 00:00 File Explorer File Menu 00:00 File Explorer - File Menu - Part 2 00:00 File Explorer Home Menu 00:00 File Explorer - Share Menu 00:00 File Explorer - View Menu 00:00 File Explorer View Menu 00:00 File Explorer Search Menu 00:00 Managing Your Desktop 00:00 Managing Your Display 00:00 Managing Cortana - Voice Assist 00:00 Quick Assist Settings 00:00 Media Streaming Settings 00:00 Recording A Screen Video 00:00 Recording An Audio 00:00 Taking A Snapshot of Your Screen 00:00 Recording Your Steps 00:00 Capturing Webcam Video 00:00 Adding Applications 00:00 Conclusion 00:00 Advanced Overview 00:00 Managing Start Up Speed 00:00 Managing Open Applications 00:00 Managing Your Hard Drive Space 00:00 Manaing Your Hard Drive Space - Storage Sense 00:00 Managing Frozen Applications 00:00 Managing Your PC Remotely 00:00 Manaing Your PC Remotely - Part 2 00:00 Managing Desktop Notifications - Focus Assist 00:00 Linking Your Mobile Device 00:00 Managing Your Backups and Restore Points 00:00 Managing Your Default Applications 00:00 Managing Your Workspace 00:00 Microsoft Edge - Write Notes 00:00 Managing Edge - Dot Menu 00:00 Managing Edge - Settings Menu Link 00:00 Managing Edge With Cortana 00:00 Managing Default Applications with Edge 00:00 Managing Lost Windows 00:00 Conclusion - Managing Voice Recognition 00:00

Windows 10 Jumpstart: A Beginner's Guide
Delivered Online On Demand1 hour 22 minutes
£25

Microsoft Windows 7 Basic - Video Training Course

4.3(43)

By John Academy

Description: This Microsoft Windows 7 Basic - Video Training Course has been designed to help you understand what an operating system is and help you get accustomed to the Windows 7 environment at a basic level. The other topics include file organization and management, printers and devices, file protection and troubleshooting, the new features of Internet Explorer 8. Windows 7 has been a strong point for Microsoft's operating system line. Its interface has been appealing and user-friendly to the users. This course starts off with an introduction to the features of the OS interface and your ability to customize it for your needs. It has a very organized system of managing records of your files, libraries, and content. The OS keeps good communication with your device and keeps your files safe with the use of Windows Defender. These new features training will surely help you to get accustomed to Windows 7. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Windows 7 Basic - Video Training Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Windows 7 Basic - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Windows 7 Environment The Windows 7 Desktop FREE 00:13:00 The Taskbar and Start Menu 00:01:00 Window Management 00:11:00 Windows Help and Support 00:04:00 Files, Folders, and Libraries Folders and Libraries 00:08:00 Working with Files 00:06:00 Managing Content Working with Windows Explorer 00:04:00 Searching for Content 00:02:00 Customizing the Environment Icons and Shortcuts 00:05:00 Gadgets 00:02:00 System Settings 00:06:00 Internet Explorer 8 Web Browsing 00:09:00 Tabbed Browsing 00:02:00 Web Searching 00:02:00 Customization 00:01:00 Multimedia Content 00:01:00 Mock Exam Mock Exam- Microsoft Windows 7 Basic - Video Training Course 00:20:00 Final Exam Final Exam- Microsoft Windows 7 Basic - Video Training Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Windows 7 Basic - Video Training Course
Delivered Online On Demand1 hour 57 minutes
£22

CompTIA Network+ Certification - Complete Video Course

4.3(43)

By John Academy

Description: The CompTIA Network+ Certification course provides an user-level knowledge and experience with personal computer operating systems and networks to present fundamental skills and concepts. The content of the course is to prepare you for the job related to networking career. The course includes Network Theory including OSI layers, LANs and WANs, network types and transmissions. You will also learn about the Bounded Network Media like cables, fibre optics, and converters and connectors. You will also be introduced to Network implementations, network communication protocols, IPv4, special addresses, CIDR, IPv6, Routing, TCP/IP services, WAN infrastructure and the Cloud Virtualization Technologies. The course also focuses on the Network Security System, Remote Networking, and Networking Management. Finally, the course will provide you information about Troubleshooting Network and the basics of SOHO (Small Office Home Office) Network. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Network+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Network Theory OSI Layers FREE 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts.prproj 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 Preventing Security Breaches Security Factors 00:15:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Honeypots 00:04:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Network Management Acceptable Use 00:59:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam- CompTIA Network+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Network+ Certification - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Network+ Certification - Complete Video Course
Delivered Online On Demand23 hours 10 minutes
£24

Microsoft Internet Explorer 6,7,8 Training

4.3(43)

By John Academy

Description: Are thinking to improve your skills and knowledge on Windows system? Then you are welcome to join this course! Microsoft Internet Explorer 6,7,8 Training is a combined course and designed especially for your benefit. Microsoft Internet Explorer 6 is the sixth major revision of Internet Explorer for Windows operating systems. In the course, you will be introduced to Internet Explorer basics, the Internet Explorer interface, ways to access a website, printing from the web, working with data, set your options, security features and so much more. You will get the basic knowledge of Windows functions, and how to use the mouse and keyboard. Following that, Microsoft Internet Explorer 7 will help you to understand the basics of Internet Explorer, Internet Explorer interface and windows, toolbar, using tabs, searching the web, managing information and history, RSS feeds and much more. Windows Internet Explorer 8 is the latest version of Microsoft's broadly used Windows operating system. With the help of this course, you will get a complete overview of the new start screen, a comprehensive look at touch gesture, an introduction to the default applications and information on using the desktop and its uses. Learning Outcomes: Learn how to understand secure sites Get knowledge of accessing the protected sites Get to know the Internet Explorer's security features Learn to keep yourself safe Learn to manage the information Know of setting your options Learn of managing history Get additional components Commence with Internet Explorer 7 Learn to browse the Internet Know how to set up favourites Learn how to be safe as you are browsing Realise the advanced features Understanding the requirements of internet connection, different types of connections, and opening, setting up and closing Internet Explorer Get an overview of the user interface by using the command area, menu bar, explorer bar, search bar and status bar Discover the application window by learning how to minimize, maximize, restore, and manually resize the window; differences between full screen vs. normal mode; and using zoom feature Enabling, disabling and locking toolbars, along with customizing the command toolbar Get help from help menu, help file, using the table of contents, searching the help file, taking internet explorer tour and online support Learn how to use the navigation buttons, understand parts of web addresses, access your homepage, access websites using address bar and/or hyperlink, and opening page in a new window Opening and closing tabs, switching between tabs, access tabbed help, using tabbed thumbnails and tab list Search the web using search boxes, search engines, within a page, and get some general tips for searching and change the search options Copying text and pictures from the web, saving pictures and web pages, and sending page, link or picture using emails Examine the print preview, page setup, printing page or selection options Understand Favourites; opening, pinning and closing favourites centre; and accessing favourites without Internet Explorer Marking pages or multiple tabs, deleting, maintaining and accessing favourites Organise your favourites by renaming them, adding folders to favourites, and saving and moving them into the folders Understand and manage accelerators, use and get new ones Get to know what are web slices, and how to get, use and find them See the differences between secure and non-secure sites, learn about encryption, digital signatures, cookies, browser cache, and display options Protect your sites using passwords, form filling, learning about the Password Manager, and CAPTCHA Discover more about information bar, pop-up blocker, phishing filter, InPrivate browsing and filtering, and finally managing add-ons Get safety tips and learn about antiviral software, anti-spam software, and firewalls Import and export favourites and cookies Understand and open dialog boxes, set up your homepage, delete temporary internet files, setup parental filtering, automatically disconnect, and set internet explorer as default browser Manage browser history by understanding what it is, access history from address bar, manually delete history items, clear entire history, and set up history options Discover the meaning of RSS Feed, how to view it, subscribing and using feeds, changing feed properties and unsubscribing from feeds Explore HTML, JavaScript, and ActiveX; view and edit HTML source code, more plugins and add-ons, and reset options for internet explorer Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Internet Explorer 6,7,8 Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Internet Explorer 6,7,8 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module : 1 DEFINITIONS 00:30:00 INTERNET EXPLORER BASICS 00:30:00 THE INTERNET EXPLORER INTERFACE 00:30:00 MORE ABOUT TOOLBARS 00:30:00 GETTING HELP 00:30:00 ACCESSING A WEB SITE 00:30:00 SEARCHING THE WEB 00:30:00 WORKING WITH DATA 00:30:00 PRINTING FROM THE WEB 00:30:00 FAVOURITE BASICS 00:30:00 CREATING AND USING FAVOURITES 00:30:00 ORGANIZING FAVOURITES 00:30:00 THE LINKS TOOLBAR 00:30:00 SECURE SITES 00:30:00 ACCESSING PROTECTED SITES 00:30:00 SECURITY FEATURES 00:30:00 KEEPING YOURSELF SAFE 00:30:00 MANAGING INFORMATION 00:30:00 SETTING YOUR OPTIONS, PART ONE 00:30:00 SETTING YOUR OPTIONS, PART TWO 00:30:00 MANAGING YOUR HISTORY 00:30:00 ADDITIONAL COMPONENTS 00:30:00 Module : 2 Definitions to Microsoft Internet Explorer 7 00:15:00 Internet Explorer Basics 00:15:00 The Internet Explorer Interface 00:15:00 The Internet Explorer Window 00:15:00 More About Toolbars 00:15:00 Getting Help 00:30:00 Access a Web Site 00:15:00 Using Tabs 00:15:00 Searching the Web 00:15:00 Working with Data 00:30:00 Printing from the Web 00:15:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:15:00 Organizing Favorites 00:15:00 The Links Folder 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 00:22:00 Keeping Yourself Safe 00:15:00 Managing Information 00:15:00 Setting Your Options 00:15:00 Managing Your History 00:15:00 RSS Feeds 00:15:00 Additional Components 00:15:00 Module : 3 Definitions 00:15:00 Internet Explorer Basics 00:30:00 The Internet Explorer Interface 01:00:00 The Internet Explorer Window 00:30:00 More about Toolbars 00:15:00 Getting Help 01:00:00 Accessing a Web Site 00:30:00 Using Tabs 00:30:00 Searching the Web 01:00:00 Working with Data 01:15:00 Printing from the Web 00:30:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:30:00 Organizing Favorites 00:30:00 Accelerators 01:00:00 Web Slices 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 01:00:00 Keeping Yourself Safe 00:15:00 Managing Information 00:30:00 Setting Your Options 01:00:00 Managing your History 00:30:00 RSS Feeds 00:30:00 Additional Components 00:30:00 Mock Exam Mock Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Final Exam Final Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Internet Explorer 6,7,8 Training
Delivered Online On Demand33 hours
£22

Raspberry Pi Step By Step Online Training

By Lead Academy

Raspberry Pi Step By Step Training Course Overview Are you looking to begin your Raspberry Pi and Python career or want to develop more advanced skills in Raspberry Pi and Python? Then this raspberry pi step by step online training course will set you up with a solid foundation to become a confident programmer and help you to develop your expertise in Raspberry Pi and Python. This raspberry pi step by step online training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this raspberry pi step by step online training course will set you up with a solid foundation to become a confident programmer and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a programmer. The raspberry pi step by step online training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a programmer. This comprehensive raspberry pi step by step online training course is the perfect way to kickstart your career in the field of Raspberry Pi and Python. This raspberry pi step by step online training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a programmer or want to learn more skills on Raspberry Pi and Python but unsure of where to start, then this raspberry pi step by step online training course will set you up with a solid foundation to become a confident programmer and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This raspberry pi step by step online training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who should take this course? This comprehensive raspberry pi step by step online training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of Raspberry Pi and Python. Entry Requirements There are no academic entry requirements for this raspberry pi step by step online training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Career path This raspberry pi step by step online training course opens a brand new door for you to enter the relevant job market and also provides you with the chance to accumulate in-depth knowledge at the side of needed skills to become flourishing in no time. You will also be able to add your new skills to your CV, enhance your career and become more competitive in your chosen industry. Course Curriculum Introduction Introduction and What You will Get When you Join Who We Are Qucik Intro To Raspberry Pi World 10 Uses for Raspberry Pi Board Different Versions of Raspberry Pi Raspberry Pi Components OS Versions Available for Raspberry Pi Arduino Vs Raspberry Pi Vs BeagleBone Course Material Works with Any High Tech Board Running The Raspberry Pi Board What do you Need to RunThe Raspberry Pi Getting OS and Running Raspberry Pi Setting Up Raspberry Pi for the First Time Simulating Raspberry Pi Raspberry Pi Hardware and Starter Kit That Can be Used With it Simple Starter Kit Raspberry Pi Modeb B Unboxing A tour inside Raspberry Pi Operating System A tour inside Raspberry Pi Operating System Raspberry Pi Command Line Updating Software Packages Control Raspberry Pi Board From Another Device Control Raspberry Pi from Another Device Using SSH Control Raspberry Pi from another Device using VNC Server Assign A fix IP Address for Raspberry Pi Board Connecting Raspberry Pi to Another Computer Using Network Cable Control General Purpose Input Output Programming GPIO with Python Python and Your First Code Installing the Control Library Practical Examples Example 1 Blinking Led Example Two Reading Input Values From A Switch Example Three Running the Led Using LDR Example Four PIR Motion Detector Additional Components and Notes BCM Numbering instead of Numbering by Order Adafruit Protection Box and Connection Cable The End Recognised Accreditation CPD Certification Service This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35.   FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Raspberry Pi Step By Step Online Training
Delivered Online On Demand
£25

Network Hacking Continued - Intermediate to Advanced

By iStudy UK

Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more. This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer's system. You'll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You'll also familiarise with hacking operating systems and different types of attacks. Additionally, you'll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks. This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks, What you'll learn Learn how to write custom scripts to gather important hacking information Discover the secrets of how to unlock WPS on routers, even if they're locked Understand how wireless phishing works and how to create fake captive portals Uncover the names of hidden networks and discover how to connect to them Learn how to replace downloaded files from a network with trojans Discover how to create trojans and combine any file in any format with an evil file Familiarise with common types of cybersecurity attacks and hacking techniques Understand how to exploit the WPS feature and hack Wi-Fi passwords Requirements Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Finished the networks section of my general ethical hacking course OR Finished my network hacking course. For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course). Who this course is for: People who want to take their network hacking skills to the next level. People who want to have a better understanding of the subject and enhance their skills. People who want to be able to run attacks manually & write their own MITM scripts. Introduction Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam FREE 00:07:00 Course Overview FREE 00:05:00 Back To Basics/Pre-Connection Attacks Pre-connection Attacks Overview 00:02:00 Spoofing Mac Address Manually 00:03:00 Targeting 5 GHz Networks 00:07:00 Deauthenticating a Client From Protected WiFi Networks 00:07:00 Deauthenticating Multiple Clients From Protected WiFi Networks 00:08:00 Deauthenticating All Clients From Protected WiFi Network 00:06:00 Gaining Access Gaining Access Overview 00:02:00 Discovering Names of Hidden Networks 00:08:00 Connecting To Hidden Networks 00:05:00 Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:00 Cracking SKA WEP Network 00:09:00 Securing Systems From The Above Attacks 00:03:00 Gaining Access - Captive Portals Sniffing Captive Portal Login Information In Monitor Mode 00:10:00 Sniffing Captive Portal Login Information Using ARP Spoofing 00:09:00 Creating a Fake Captive Portal - Introduction 00:04:00 Creating Login Page - Cloning a Login Page 00:07:00 Creating Login Page - Fixing Relative Links 00:07:00 Creating Login Page - Adding Form Tag 00:08:00 Creating Login Page - Adding Submit Button 00:07:00 Preparing Computer To Run Fake Captive Portal 00:08:00 Starting The Fake Captive Portal 00:12:00 Redirecting Requests To Captive Portal Login Page 00:12:00 Generating Fake SSL Certificate 00:06:00 Enabling SSL/HTTPS On Webserver 00:08:00 Sniffing & Analysing Login Credentials 00:06:00 Gaining Access - WPA/WPA2 Cracking - Exploiting WPS Exploiting WPS - Introduction 00:02:00 Bypassing 'Failed to associate' Issue 00:08:00 Bypassing 0x3 and 0x4 Errors 00:08:00 WPS Lock - What Is It & How To Bypass It 00:07:00 Unlocking WPS 00:09:00 Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack Advanced Wordlist Attacks - Introduction 00:02:00 Saving Aircrack-ng Cracking Progress 00:10:00 Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:08:00 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:11:00 Gaining Access - WPA/WPA Cracking - Evil Twin Attack What is It & How it Works 00:07:00 Installing Needed Software 00:08:00 Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 00:10:00 Debugging & Fixing Login Interface 00:12:00 Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise What is WPA/WPA2 Enterprise & How it Works 00:05:00 How To Hack WPA/WPA2 Enterprise 00:07:00 Stealing Login Credentials 00:08:00 Cracking Login Credentials 00:07:00 Securing Systems From The Above Gaining Access Attacks 00:05:00 Post Connection Attacks Post Connection Attacks Overview 00:04:00 Ettercap - Basic Overview 00:07:00 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:10:00 Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 00:13:00 Automatically ARP Poisoning New Clients 00:07:00 DNS Spoofing Using Ettercap 00:06:00 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:00 Post Connection Attacks - Analysing Data Flows & Running Custom Attacks MITMproxy - What is It & How To Install It 00:04:00 Using MITMproxy In Explicit Mode 00:07:00 Analysing (Filtering & Highlighting) Flows 00:05:00 Intercepting Network Flows 00:05:00 Modifying Responses & Injecting Javascript Manually 00:09:00 Intercepting & Modifying Responses In Transparent Mode 00:08:00 Editing Responses & Injecting BeEF's Code On The Fly 00:09:00 Editing Responses Automatically Based On Regex 00:09:00 Stealing Login Info Using Fake Login Promo 00:07:00 [Bonus] - Hacking Windows 10 Using A Fake Update 00:05:00 Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks What Do Mean By MITM Scripts? 00:06:00 Capturing & Printing Requests/Responses 00:09:00 Filtering Flows & Extracting Useful Data 00:09:00 Using Conditions To Execute Code On Useful Flows 00:10:00 Generating Custom HTTP Responses 00:09:00 Testing Script Locally 00:09:00 Generating Trojans - Installing The Trojan Factory 00:06:00 Generating Trojans - Converting Any File (eg: mage) To a Trojan 00:10:00 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:00 Executing Bash Commands & Calling Trojan Factory From Our Script 00:09:00 Using Variables & More Complex Conditions 00:09:00 Converting Downloads To Trojans On The Fly 00:10:00 Configuring The Trojan Factory's MITMproxy Script 00:08:00 Using The Trojan Factory MITMproxy Script 00:08:00 Post-Connection Attacks - Doing All Of The Above On HTTPS Websites Bypassing HTTPS With MITMproxy 00:06:00 Replacing Downloads From HTTPS 00:05:00 Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 00:06:00 Securing Systems From The Above Post Connection Attacks 00:06:00

Network Hacking Continued - Intermediate to Advanced
Delivered Online On Demand10 hours 2 minutes
£25

Learn Hacking Windows 10 Using Metasploit from Scratch

By Packt

In this course, you will start as a beginner without any previous knowledge about hacking. The course focuses on both practical and theoretical sides to ensure that you understand the attack before performing it. Learn how black hat hackers hack and White hat hackers secure Windows OS with the help of advanced methods.

Learn Hacking Windows 10 Using Metasploit from Scratch
Delivered Online On Demand10 hours 28 minutes
£18.99

Basic Java

By Course Cloud

Java is one of the most popular programming languages, due to its versatility and compatibility. In 2019, 88% market share of all smartphones run on Android, which is a mobile operating system written by Java.  This Basic Java course is a step-by-step training course for aspiring programmers and app developers. It is the quickest and most effective way to learn Java online, and will equip you with the in-demand skills needed to gain a competitive advantage in this field. In this course, you will gain a basic beginner-level understanding of Java programming. You will learn how to use Java for software development, mobile applications, and large systems development, learning from the experts, to take your career to the next level. This best selling Basic Java has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Basic Java is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Basic Java is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Basic Java is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Basic Java, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Basic Java will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Basic Java to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Basic Java
Delivered Online On Demand
£25

Complete Java

By Course Cloud

Course Overview Java is one of the world's leading programming languages, due to its versatility and compatibility. In 2019, 88% market share of all smartphones ran on Android, which is a mobile operating system written by Java.  This Complete Java course is the perfect stepping stone for aspiring programmers and app developers. It is the quickest and most effective way to learn Java online, and will equip you with the in-demand skills needed to gain a competitive advantage in this field. In this course, you will gain a comprehensive understanding of Java programming. You will learn how to use Java for software development, mobile applications, and large systems development, with video guidance from the experts, to take your career to the next level. This best selling Complete Java has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Complete Java is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Complete Java is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Complete Java is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Complete Java, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Complete Java will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Complete Java to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Complete Java
Delivered Online On Demand
£25