• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

351 Print courses in Uttoxeter delivered Live Online

Complete C programming

5.0(3)

By Systems & Network Training

Complete C programming training course description A hands-on introduction to programming in the ANSI C programming language. The course initially moves at a fast pace in order to spend as much time as possible on the subject of pointers - the area which cause the most bugs in C programs. What will you learn Write ANSI C programs Use the C libraries Debug C programs Examine existing code and determine its function. Complete C programming training course details Who will benefit: Programmers wishing to learn C. Programmers wishing to learn C++ or Java. Prerequisites: None, although experience in another high level language would be useful. Duration 5 days Complete C programming training course contents Getting started The compilation process, comments, main(), statement blocks, printf(). C data types and operators char, int, float and double, qualifiers, arithmetic and assignment operators, precedence, Associativity. Basic I/O C libraries, stdin and stdout, getchar(), putchar(), printf() formatting. Flow control if else, dangling elses, else if, while and for loops. switch statements, the null statement, break, continue and gotos. Functions Function calls, arguments and return types, function declarations (prototypes), function definitions, scope of variables. The preprocessor Preprocessor actions, macros, #include. Libraries and their relationship with header files. Conditional compilation. More data types and operators Logical, bitwise and other operators, type conversion, casting, typedefs and access modifiers. Arrays Declaring and handling arrays, common gotchas, multidimensional arrays. Pointers What are pointers? Why they are so important, declaring and using pointers,The three uses of the *,pointer example - scanf, pointers as arguments. More pointers Golden rules of pointers and arrays, pointers to arrays, pointer arithmetic, arrays of pointers, multiple indirection. Character/string manipulation Arrays of characters, string definition, working with strings, String library. Program arguments argc and argv, example uses,char *argv[] versus char ** argv. Program structure and storage classes Globals (externals), multi source programs, the look of a C program. Structures Declaration, the . and - operators, unions and bitfields. Library functions File handling, fopen and fclose, reading from and writing to files, fseek().calloc() and malloc()

Complete C programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Bloom where you're planted: A Saturday online gathering for you and SoulCollage ®

4.9(10)

By The Soul Shed

SoulCollage® is about deepening our contact and connection with our life force energy and the world around us. This offering is for new and experienced SoulCollagers alike. We will explore imagery through our somatic felt sensing, make and let it really move through us into language and collage that connects our curious minds, open hearts, and instinctual knowing. We'll take inspiration from our connection with nature, with our own square miles of belonging, and from poets who connect us with the moment in exciting ways. No expertise or experience needed in anything apart from in being you. Overseas friends: Collact a stash of old magazines and greetings cards in advance! Free download of images available to you to print off before the session, plus details on what else you will need. Add on a collaging pack if you book from the UK before August to make sure it is with you in time. SoulCollage® is about deepening our contact and connection with our life force energy and the world around us. This offering is for new and experienced SoulCollagers alike. We will explore imagery through our somatic felt sensing, make and let it really move through us into language and collage that connects our curious minds, open hearts, and instinctual knowing. We'll take inspiration from our connection with nature, with our own square miles of belonging, and from poets who connect us with the moment in exciting ways. No expertise or experience needed in anything apart from in being you. Overseas friends: Collact a stash of old magazines and greetings cards in advance! Free download of images available to you to print off before the session, plus details on what else you will need. Add on a collaging pack if you book from the UK before August to make sure it is with you in time.

Bloom where you're planted: A Saturday online gathering for you and SoulCollage ®
Delivered OnlineFlexible Dates
£25

Visio Flowcharts and Diagrams

By Underscore Group

Ensure you can fully utilize this powerful tool to create a range of flowcharts and diagrams. Course overview Duration: 1 day (6.5 hours)  Microsoft Visio is a powerful tool designed to simplify complex information through the creation of simple, professional-looking diagrams. While Visio is capable of producing almost any type of drawing this training concentrates on flowcharts, swim lane process diagrams and organisation charts. You will also discover the real power of Visio by adding essential data to the content of your diagrams and producing reports in Excel using this data. This course is designed for either new users of Visio or those who have dabbled and can create basic diagrams. Our course will give you the skills and knowledge you need to navigate your way around this powerful program and produce different types of diagram. Objectives  By the end of the course you will be able to: Create and amend flowcharts Create cross functional (Swim Lane) process flows Produce organisation charts by importing data Add essential data to shapes Export diagram data reports to Excel Present, publish and print Visio diagrams Content Visio essentials Finding your way around Visio Using the ribbon and Quick Access toolbar Keyboard shortcuts Shapes and stencils explained What Visio can do for you Creating basic flowcharts Working with shapes Adding and deleting shapes Joining, aligning and sizing shapes Using Auto-Connect Labelling shapes and connectors Editing and improvinC flowcharts Amending shape and connector labels Using colours to emphasise Changing line styles Moving and copying objects Grouping diagram elements Quick ways of working Cross functional flowcharts Creating Cross-Functional Flowcharts Manipulating functional bands Creating off-page references within diagrams and hyperlinks to other documentation Organising charts and shape data Using the wizard to create an organisation Chart Importing existing Data into to create an organisation chart Modifying an organisation chart Shape Data Adding shape data to a shape Creating shape data sets Diagram reports Exporting data to a report in Excel Exporting to HTML Creating and customizing reports Presenting, publishing and printing Using Page Setup Print previewing Embedding backgrounds Adding headers and footers Converting your final documentation to PDF Saving as HTML Visio with PowerPoint

Visio Flowcharts and Diagrams
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

How to use Heat Engineer Software 23rd Jan Tuesday

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software 23rd Jan Tuesday
Delivered OnlineJoin Waitlist
£47.93

How to use Heat Engineer Software (Nov Selectable dates)

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software (Nov Selectable dates)
Delivered OnlineJoin Waitlist
£47.93

How to use Heat Engineer Software 18th May

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software 18th May
Delivered OnlineJoin Waitlist
£47.93

How to use Heat Engineer Software 4th May

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software 4th May
Delivered OnlineJoin Waitlist
£47.93

How to use Heat Engineer Software 28th Feb

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software 28th Feb
Delivered OnlineJoin Waitlist
£47.93

How to use Heat Engineer Software 1st August Tuesday

3.7(8)

By Heat Engineer

For new users and the curious. Hello, For new users and the curious. IMPORTANT: Firstly, once you are signed up, send us your requests on what you would like to see within the demonstration and learn on the course. We will then cater for your needs and answer them during the session. This is designed to be an introduction into how to start a room by room survey using the Heat Engineer app, then sending this survey to the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

How to use Heat Engineer Software 1st August Tuesday
Delivered OnlineJoin Waitlist
£47.93