• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3286 Security courses delivered On Demand

Digital Forensics for Cyber Professionals

4.9(27)

By Apex Learning

Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00

Digital Forensics for Cyber Professionals
Delivered Online On Demand5 hours 37 minutes
£12

Ethical Hacking with Kali Linux

4.9(27)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Level 5 Diploma in Fire Warden Training - QLS Endorsed

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost

Level 5 Diploma in Fire Warden Training  - QLS Endorsed
Delivered Online On Demand12 hours
£105

Complete Document Control Training

By Wise Campus

Document Control: Complete Document Control Course Online Do you wish to strengthen your document control abilities? If so, you are welcome to enrol in our specially created Document Control Course, which is intended to provide participants an in-depth understanding. You will learn about the advantages of document management as well as the document control lifecycle in this Document Control course. The Document Control course also explains how to make a document control system more efficient. Additionally, the Document Control course places a strong emphasis on the underlying expertise, best practices, and legal ideas related to document control. Following your completion of our Document Control programme, you'll be more efficient at work. Join in our Document Control programme to get the skills you need to become more productive and structured. Learning Outcome of Document Control Course After completing the Document Control, learners will know about: Introduction to document control. The basics of document control. Keep document identification as a Document Control expert. Document classifying, filing & information security for Document Controlling. Document Control also explains documents lifecycle and document distribution. Project document control, prepare final documentation controlling and specifications for Document Control in an organisation. The Document Control course teaches electronic document management systems. Interactions with project teams, engineering teams, managers described in other modules of Document Control course. Special Offers of this Document Control: Complete Document Control Course This Document Control: Complete Document Control Course includes a FREE PDF Certificate. Lifetime access to this Document Control: Complete Document Control Course Instant access to this Document Control: Complete Document Control Course Get FREE Tutor Support to this Document Control: Complete Document Control Course Document Control: Complete Document Control Course Online You will learn the fundamentals of document control as well as how to recognize it in this course on document control. The classification and security of the document management system are also covered in the Document management course. Furthermore, the course on document control has a strong emphasis on the document control lifecycle, legal ideas, best practices, and underlying expertise. After completing our Document Control program, you will be more efficient at creating the final paperwork and management. You may manage teams, engineering, and document control as a document control specialist. Who is this course for? Document Control: Complete Document Control Course Online This Document Control course is open to students without any prior understanding of Document Control. Requirements Document Control: Document Control Course Online To enrol in this Document Control: Complete Document Control Course, students must fulfil the following requirements. To join in our Document Control: Complete Document Control Course, you must have a strong command of the English language. To successfully complete our Document Control: Complete Document Control Course, you must be vivacious and self driven. To complete our Document Control: Complete Document Control Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Document Control: Complete Document Control Course. Career path Document Control: Complete Document Control Course Online Training in Document Control: Complete Document Control is a special chance to develop important abilities and progress your career.

Complete Document Control Training
Delivered Online On Demand48 minutes
£12

Criminal Law & Police

By IOMH - Institute of Mental Health

Overview of Criminal Law & Police Join our Criminal Law & Police course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Criminal Law & Police course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Criminal Law & Police course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a quick look at the course content: This Criminal Law & Police Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Criminal Law & Police. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Criminal Law & Police course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Criminal Law & Police is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Criminal Law & Police course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Criminal Law & Police Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Criminal Law Module 1: Introduction to Criminal Law Introduction to Criminal Law 00:19:00 Criminal Law Module 2: Elements of a Crime Elements of a Crime 00:27:00 Criminal Law Module 3: Incitement, Conspiracy and Attempt Incitement, Conspiracy and Attempt` 00:27:00 Criminal Law Module 4: Accomplice Accomplice 00:26:00 Criminal Law Module 5: Crime Prevention Crime Prevention 00:27:00 Criminal Law Module 6: The Police The Police 00:33:00 Criminal Law Module 7: Prosecution, Caution and Diversion Prosecution, Caution and Diversion 00:26:00 Criminal Law Module 8: Youth Justice Youth Justice 00:23:00 Criminal Law Module 9: The Trial The Trial 00:26:00 Criminal Law Module 10: Sentencing Process Sentencing Process 00:25:00 Criminal Law Module 11: Homicide Homicide 00:31:00 Criminal Law Module 12: Offences against Person Offences against Person 00:21:00 Criminal Law Module 13: Sexual Offences Sexual Offences 00:22:00 Criminal Law Module 14: Theft Theft 00:22:00 Criminal Law Module 15: Blackmail, Robbery & Burglary Blackmail, Robbery _ Burglary 00:22:00 Criminal Law Module 16: White-Collar Crime White-Collar Crime 00:27:00 Criminal Law Module 17: Terrorism & Law Terrorism _ Law 00:23:00 Criminal Law Module 18: Property Offences Property Offences 00:22:00 Criminal Law Module 19: Cybercrime & Piracy Cybercrime _ Piracy 00:29:00 Criminal Law Module 20: Prisons Prisons 00:26:00 Criminal Law Module 21: Probation Service Probation Service 00:26:00 Criminal Law Module 22: War Crimes War Crimes 00:34:00 Assignment Assignment - Criminal Law & Police 00:00:00

Criminal Law & Police
Delivered Online On Demand9 hours 24 minutes
£11

Network Association on MikroTik

By Course Cloud

The comprehensive Network Association on MikroTik has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Network Association on MikroTik today, and learn from the very best the industry has to offer! This best selling Network Association on MikroTik has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Network Association on MikroTik is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Network Association on MikroTik is CPD-accredited, so you can be confident you're completing a quality training course which will boost your CV and enhance your career potential. The Network Association on MikroTik is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Network Association on MikroTik, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Network Association on MikroTik will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Network Association on MikroTik to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Network Association on MikroTik
Delivered Online On Demand
£25

Digital Forensic Science Fundamentals Course

5.0(2)

By Training Express

In a world where every click leaves a trace, digital forensic science has become the modern detective's magnifying glass. From deleted texts to encrypted drives, the truth rarely hides for long when science meets cyber investigation. This course takes you into the fascinating world of digital trails, revealing how data is tracked, analysed and used in investigations across law enforcement, business, and cybersecurity sectors. You'll explore how evidence is gathered from devices, how experts think like digital sleuths, and what methods are used to maintain integrity throughout. Whether you’re interested in solving cybercrimes, working with legal investigations, or simply curious about what really happens behind the scenes of a digital breach, this course gives you the core knowledge needed to understand how today’s digital world can be decoded. It’s sharp, informative, and doesn’t involve lab coats or spy gadgets—just pure digital know-how. The demand for digital forensic analysts has risen by over 21% in the last five years in the UK alone, and with cyber threats only growing, it’s not slowing down anytime soon. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to Digital Forensics Module 2: Digital Forensic Investigation Module 3: Evidence Management Module 4: Apprehending Offenders Module 5: Maintain Evidence-Based Reporting Module 6: File System Analysis Part-1 Module 7: File System Analysis Part-2 Module 8: Network Forensics Module 9: Memory Forensics Module 10: Digital Evidence in the Courtroom Learning Outcomes: Conduct effective digital investigations using specialised techniques. Manage and preserve digital evidence with meticulous attention to detail. Apprehend offenders by applying advanced investigative strategies. Create evidence-based reports to support legal proceedings. Analyse file systems comprehensively, uncovering hidden information. Utilise network and memory forensics to extract valuable insights. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? IT professionals looking to specialise in digital forensics. Law enforcement personnel aiming to enhance their investigative skills. Cybersecurity enthusiasts interested in digital crime-solving. Legal professionals seeking expertise in digital evidence. Computer science graduates aspiring to work in forensics. Private investigators wanting to expand their skill set. Individuals with a passion for technology and investigation. Anyone intrigued by the intersection of cybercrime and forensic science. Career path Digital Forensic Analyst Cybersecurity Investigator Incident Responder Forensic IT Specialist Cybercrime Investigator Computer Forensic Examiner Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

Digital Forensic Science Fundamentals Course
Delivered Online On Demand1 hour
£12

Internet of Things

4.9(27)

By Apex Learning

Overview This comprehensive course on Internet of Things will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Internet of Things comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Internet of Things. It is available to all students, of all academic backgrounds. Requirements Our Internet of Things is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 65 lectures • 08:53:00 total length •Module 01: Introduction: 00:02:00 •Module 02: Course Agenda: 00:03:00 •Module 01: Introduction to Internet of Things: 00:13:00 •Module 02: Choosing Cloud Services for IoT: 00:05:00 •Module 03: What is Raspberry Pi Part 1?: 00:09:00 •Module 04: What is Raspberry Pi Part 2?: 00:06:00 •Module 01: Downloading OS for Raspberry Pi Noobs-Raspbian: 00:07:00 •Module 02: Install OS using NOOBS: 00:11:00 •Module 03: Remote Control of Raspberry Pi Using VNC Viewer: 00:10:00 •Module 04: Install OS using Raspbian Image part 1: 00:06:00 •Module 05: Install OS using Raspbian Image part 2: 00:02:00 •Module 01: Getting Around Raspbian Operating System part 1: 00:10:00 •Module 02: Getting around Raspbian Operating System part 2: 00:08:00 •Module 03: Getting around Raspbian Operating System part 3: 00:06:00 •Module 04: How To Run Python program On Raspberry Pi: 00:09:00 •Module 01: Raspberry PI GPIO Concepts: 00:07:00 •Module 02: Raspberry Pi GPIO Interfacing Single LED: 00:17:00 •Module 03: Raspberry Pi GPIO Interfacing Multiple LED's: 00:09:00 •Module 04: Rapberry Pi GPIO Interfacing Buzzer: 00:03:00 •Module 01: Raspberry Pi and Transistorized Switching: 00:09:00 •Module 02: Raspberry Pi and Relay part 1: 00:13:00 •Module 03: Raspberry Pi and Relay part 2: 00:08:00 •Module 01: Accepting Digital Input on Raspberry Pi Part 1: 00:13:00 •Module 02: Accepting Digital Inputs on Raspberry Pi Part 2: 00:07:00 •Module 01: Sensor Interfacing With Raspberry Pi LDR1: 00:05:00 •Module 02: Sensor Interfacing With Raspberry Pi LDR 2: 00:10:00 •Module 03: Sensor Interfacing With Raspberry Pi LDR 3: 00:07:00 •Module 04: Sensor Interfacing with Rapberry Pi DHTT11 part 1: 00:10:00 •Module 05: Sensor Interfacing with Rapberry Pi DHTT11 part 2: 00:10:00 •Module 06: Sensor Interfacing with Raspberry pi Using SenseHAT: 00:11:00 •Module 07: Ultrasonic Sensor Interfacing with Raspberry Pi: 00:14:00 •Module 01: BMP180 with Raspberry Pi: 00:07:00 •Module 02: Enabling I2C on Raspberry Pi: 00:05:00 •Module 03: BMP180 Python Code: 00:06:00 •Module 01: Getting Started With IoT: 00:11:00 •Module 02: Getting Started with Microsoft Azure IoT Hub Part 1: 00:04:00 •Module 03: Getting Started with Microsoft Azure IoT Hub Part 2: 00:05:00 •Module 04: Getting Started with Microsoft Azure IoT Hub Part 3: 00:09:00 •Module 05: Create Device inside Azure IoT Hub: 00:06:00 •Module 06: Enable Azure Cloud Shell and enable IoT Extension: 00:08:00 •Module 07: Send Data to Azure IoT Hub Using Python Program: 00:09:00 •Module 08: Send Actual Temperature and Humidity Values to Azure IoT hub: 00:03:00 •Module 09: Storing the Data on Microsoft Azure Using Custom Gateway: 00:13:00 •Module 10: Save data to blob storage using Stream Analytics Job: 00:12:00 •Module 11: Data Visualization with Power BI Part 1: 00:07:00 •Module 12: Data Visualization with Power BI Part 2: 00:12:00 •Module 13: Creating Custom web app with azure for data visualization Part 1: 00:10:00 •Module 14: Creating Custom web app with azure for data visualization Part 2: 00:14:00 •Module 15: Creating Custom web app with azure for data visualization Part 3: 00:12:00 •Module 16: Dealing with password error while pushing your webapp to azure: 00:01:00 •Module 17: Cleaning up Azure Resources: 00:02:00 •Module 18: Remote Monitoring using Azure Logic App Part 1: 00:12:00 •Module 19: Remote Monitoring using Azure Logic App Part 2: 00:10:00 •Module 01: Introduction to Thingspeak: 00:06:00 •Module 02: Create an account and send data to Thingspeak: 00:08:00 •Module 01: Getting started with SaaS IoT Platform io.adafruit.com: 00:08:00 •Module 02: What is MQTT?: 00:10:00 •Module 03: Sending Data to Adafruit Io Using MQTT Part 1: 00:17:00 •Module 04: Sending Data to Adafruit io Using MQTT part 2: 00:14:00 •Module 05: Home automation project with adafruit IO Part 1: 00:15:00 •Module 06: Home Automation Project with Adafruit IO Part 2: 00:02:00 •Module 01: IoT Security: 00:14:00 •Module 02: Conclusion: 00:01:00 •Resources - Internet of Things: 00:00:00 •Assignment - Internet of Things: 00:00:00

Internet of Things
Delivered Online On Demand8 hours 53 minutes
£12

Salesforce Integration With External Systems Part 2

By Packt

Explore data connectivity and streamline workflows by mastering integrating Salesforce with external systems. Discover a range of tools and techniques to seamlessly connect Salesforce with external apps. Understand concepts such as Auth Providers/Named Credentials, HTTP callouts, and OpenAPI 3.0, and achieve robust integrations without coding.

Salesforce Integration With External Systems Part 2
Delivered Online On Demand4 hours 55 minutes
£44.99

A to Z SQL Programming

4.7(160)

By Janets

Follow your dreams by enrolling on the A to Z SQL Programming course today and develop the experience, skills and knowledge you need to enhance your professional development. A to Z SQL Programming will help you arm yourself with the qualities you need to work towards your dream job. Study the A to Z SQL Programming training course online with Janets through our online learning platform and take the first steps towards a successful long-term career. The A to Z SQL Programming course will allow you to enhance your CV, impress potential employers, and stand out from the crowd.  This A to Z SQL Programming course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Study the A to Z SQL Programming course through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the A to Z SQL Programming course, to ensure you are supported every step of the way. Get a digital certificate as proof of your A to Z SQL Programming course completion. Janets is one of the top online training course providers in the UK, and we want to make education accessible to everyone! Learn the essential skills you need to succeed and build a better future for yourself with the A to Z SQL Programming course. The A to Z SQL Programming course is designed by industry experts and is tailored to help you learn new skills with ease.  The A to Z SQL Programming is incredibly great value and allows you to study at your own pace. With full course access for one year, you can complete the A to Z SQL Programming when it suits you. Access the A to Z SQL Programming course modules from any internet-enabled device, including computers, tablets, and smartphones. The A to Z SQL Programming course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the A to Z SQL Programming now and start learning instantly! What You Get Out Of Studying A to Z SQL Programming With Janets: Receive a digital Certificate upon successful completion of the A to Z SQL Programming course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Description The A to Z SQL Programming training course is delivered through Janets' online learning platform. Access the A to Z SQL Programming content from any internet-enabled device whenever or wherever you want to. The A to Z SQL Programming course has no formal teaching deadlines, meaning you are free to complete the course at your own pace. Method of Assessment  To successfully complete the A to Z SQL Programming course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the A to Z SQL Programming course. After successfully passing the A to Z SQL Programming course exam, you will be able to apply for a CPD-accredited certificate as proof of your A to Z SQL Programming qualification. Certification All students who successfully complete the A to Z SQL Programming course can instantly download their digital certificate. You can also purchase a hard copy of the A to Z SQL Programming course certificate, which will be delivered by post for £9.99. Who Is This Course For: The A to Z SQL Programming is ideal for those who already work in this sector or are an aspiring professional. This A to Z SQL Programming course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The A to Z SQL Programming is open to all students and has no formal entry requirements. To study the A to Z SQL Programming course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Career Path: The A to Z SQL Programming is ideal for anyone who wants to pursue their dream career in a relevant industry. Learn the skills you need to boost your CV and go after the job you want. Complete the A to Z SQL Programming and gain an industry-recognised qualification that will help you excel in finding your ideal job. Course Content Beginner Module: 01 Introduction FREE 00:16:00 Tools for Creating Views 00:11:00 Examples 00:21:00 Updating Data Using a View 00:13:00 Columns and Indexed Views 00:18:00 Module: 02 Introduction Stored Procedures 00:18:00 Creating Stored Procedures 00:19:00 Returning Data 00:14:00 Module: 03 Testing and Debugging 00:17:00 Execute with Result Sets 00:11:00 Creating Triggers 00:26:00 Module: 04 Overview and Scalar Functions 00:20:00 Inline Table Valued Functions 00:11:00 Multi Statement 00:16:00 Views and Stored Procedures 00:18:00 Module: 05 Transaction Concepts 00:30:00 Applications and Transactions 00:13:00 Creating Explicit Transactions 00:29:00 Structured Error Handling 00:25:00 Module: 06 Introduction to SQL CLR 00:08:00 Writing SQL CLR Code 00:24:00 Using SQL CLR Code 00:22:00 SQL CLR Code 00:13:00 SQL CLR Security 00:20:00 Intermediate Module: 01 Topic A Aggregates 00:27:00 Topic B User Defined Types 00:17:00 Topic C Table and Functions 00:10:00 Topic D Managing Code Modules 00:08:00 Module: 02 Topic A Introduction Data Tools 00:19:00 Topic B Connected Database Development 00:20:00 Topic C Updating a Connected Database 00:16:00 Module: 03 Topic A Creating New Objects with TSQL 00:12:00 Topic B Comparing Database Schemas 00:10:00 Topic C Offline Database Development 00:13:00 Topic D Database Project Settings 00:18:00 Module: 04 Topic A Using APPLY 00:15:00 Topic B MERGE Statement 00:23:00 Topic C Creating Recursive Queries 00:08:00 Topic D Grouping Sets 00:12:00 Module: 05 Topic A ROLLUP and CUBE Operators 00:12:00 Topic B Creating Pivot Queries 00:14:00 Topic C Executing Dynamic SQL 00:28:00 Module: 06 Topic A Complex Query Execution 00:26:00 Topic B Using Execution Plans 00:16:00 Topic C Execution Plan Operators 00:12:00 Topic D Common Join Operators 00:16:00 Module: 07 Topic A Hierarchy ID Data Type 00:12:00 Topic B Exploring a Hierarchy 00:09:00 Topic C Sparse Columns 00:16:00 Topic D Column Sets 00:12:00 Module: 08 Topic A Filtered Indexes 00:09:00 Topic B FILESTREAM Storage 00:22:00 Topic C Adding Sequences to Queries 00:22:00 Module: 09 Topic A Introduction to Spatial Data 00:13:00 Topic B Spatial Data in SQL Server 00:23:00 Topic C Manipulating Spatial Shapes 00:10:00 Topic D Interactions Between Objects 00:09:00 Advanced Module: 01 Topic A Partitioning 00:20:00 Topic B Creating Partition Tables 00:30:00 Topic C Querying Partitions 00:14:00 Topic D Managing Partitions 00:17:00 Module: 02 Topic A Complex Querying 00:22:00 Topic B Rankings 00:15:00 Topic C SubQueries 00:21:00 Topic D Common Table Expressions 00:17:00 Module: 03 Topic A Complex Data and Structures 00:26:00 Topic B Efficient Queries 00:36:00 Topic C Complex Queries 00:17:00 Module: 04 Topic A XML Data Type 00:28:00 Topic B XML Schemas 00:17:00 Topic C Querying XML 00:20:00 Topic D Best Practices 00:08:00 Mock Exam Mock Exam - A to Z SQL Programming 00:20:00 Final Exam Final Exam - A to Z SQL Programming 00:20:00

A to Z SQL Programming
Delivered Online On Demand21 hours 30 minutes
£9.99