Duration 1 Days 6 CPD hours This course is intended for To gain the most from attending this course you should possess the following incoming skills: Basic knowledge of programming concepts and syntax in Python. Familiarity with common data formats such as CSV, JSON, and XML. Experience using command-line interfaces and basic text editing tools. Understanding of basic machine learning concepts and algorithms. Overview Working in an interactive learning environment, led by our engaging expert, you will: Gain a solid understanding of prompt engineering concepts and their applications in software development and AI-driven solutions. Master the techniques for preprocessing and cleaning text data to ensure high-quality inputs for AI models like GPT-4. Develop expertise in GPT-4 tokenization, input formatting, and controlling model behavior for various tasks and requirements. Acquire the ability to design, optimize, and test prompts effectively, catering to diverse business applications and use cases. Learn advanced prompt engineering techniques, such as conditional text generation and multi-turn conversations, to create more sophisticated AI solutions. Practice creating prompts to generate, run, and test code in a chosen programming language using GPT-4 and OpenAI Codex. Understand the ethical implications and best practices in responsible AI deployment, ensuring fair and unbiased AI applications in software development. Prompt Engineering offers coders and software developers a competitive edge by empowering them to develop more effective and efficient AI-driven solutions in their projects. By harnessing the capabilities of cutting-edge AI models like GPT-4, coders can automate repetitive tasks, enhance natural language understanding, and even generate code suggestions, boosting productivity and creativity. In addition, mastering prompt engineering can contribute to improved job security, as professionals with these in-demand skills are highly sought after in the rapidly evolving tech landscape. Quick Start to Prompt Engineering for Coders and Software Developers is a one day course designed to get you quickly up and running with the prompting skills required to out AI to work for you in your development efforts. Guided by our AI expert, you?ll explore key topics such as text preprocessing, data cleansing, GPT-4 tokenization, input formatting, prompt design, and optimization, as well as ethical considerations in prompt engineering. In the hands-on labs you?ll explore tasks such as formatting inputs for GPT-4, designing and optimizing prompts for business applications, and implementing multi-turn conversations with AI. You?ll work with innovative tools like the OpenAI API, OpenAI Codex, and OpenAI Playground, enhancing your learning experience while preparing you for integrating prompt engineering into your professional toolkit. By the end of this immersive course, you?ll have the skills necessary to effectively use prompt engineering in your software development projects. You'll be able to design, optimize, and test prompts for various business tasks, integrate GPT-4 with other software platforms, and address ethical concerns in AI deployment. Introduction to Prompt Engineering Overview of prompt engineering and its importance in AI applications Major applications of prompt engineering in business Common challenges faced in prompt engineering Overview of GPT-4 and its role in prompt engineering Key terminology and concepts in prompt engineering Getting Things Ready: Text Preprocessing and Data Cleansing Importance of data preprocessing in prompt engineering Techniques for text cleaning and normalization Tokenization and n-grams Stop word removal and stemming Regular expressions and pattern matching GPT-4 Tokenization and Input Formatting GPT-4 tokenization and its role in prompt engineering Understanding and formatting GPT-4 inputs Context windows and token limits Controlling response length and quality Techniques for handling out-of-vocabulary tokens Prompt Design and Optimization Master the skills to design, optimize, and test prompts for various business tasks. Designing effective prompts for different tasks Techniques for prompt optimization GPT-4 system and user parameters for controlling behavior Importance of prompt testing and iteration Best practices for prompt engineering in business applications Advanced Techniques and Tools in Prompt Engineering Learn advanced techniques and tools for prompt engineering and their integration in business applications. Conditional text generation with GPT-4 Techniques for handling multi-turn conversations Overview of tools for prompt engineering: OpenAI API, OpenAI Codex, and OpenAI Playground Integration of GPT-4 with other software platforms and tools Monitoring and maintaining prompt performance Code Generation and Testing with Prompt Engineering Develop the skills to generate, integrate, and test AI-generated code effectively, enhancing productivity and creativity in software development projects. Introduction to code generation with AI models like GPT-4 Designing prompts for code generation across programming languages Techniques for specifying requirements and constraints in prompts Generating and interpreting code snippets using AI-driven solutions Integrating generated code into existing projects and codebases Best practices for testing and validating AI-generated code Ethics and Responsible AI Understand the ethical implications of prompt engineering and the importance of responsible AI deployment in business. Ethical considerations in prompt engineering Bias in AI systems and its impact on prompt engineering Techniques to minimize bias and ensure fairness Best practices for responsible AI deployment in business applications Monitoring and addressing ethical concerns in prompt engineering
Do you want to build a CI/CD pipeline to deploy applications or microservices on AKS and EKS Kubernetes cluster using Helm and Jenkinsfile? Then you are in the right place.
Police: Criminology and Criminal Law Level 5 Become a successful criminal investigative analyst by enrolling in our Police: Criminology and Criminal Law Level 5 course! Do you want to work at the intersection of psychology and law enforcement? Or do you want to develop your present skills? If so, our distinctive Police: Criminology and Criminal Law Level 5 course could be the key to your success. This Police: Criminology and Criminal Law Level 5 is a carefully designed course that guarantees that you fully comprehend everything about the subject. Get top-notch instruction from the Police: Criminology and Criminal Law Level 5 course to increase your level of experience. The course for the Police: Criminology and Criminal Law Level 5 is divided into a number of in-depth modules. Beginning with a brief introduction, both forensic science and criminology are covered in the Police: Criminology and Criminal Law Level 5 course. As a result, you will learn about victimology and crime types in the Police: Criminology and Criminal Law Level 5 program. You can easily understand criminal psychology and the criminal justice system in England and Wales after completing the Police: Criminology and Criminal Law Level 5 program. Dedicate yourself to excellence by enrolling in our Police: Criminology and Criminal Law Level 5 today! Police: Criminology and Criminal Law Level 5 Course This Criminology and Criminal Law: Criminology and Criminal Law Course includes a FREE PDF Certificate. Lifetime access to this Criminology and Criminal Law: Criminology and Criminal Law Course Instant access to this Criminology and Criminal Law: Criminology and Criminal Law Course Get FREE Tutor Support to this Criminology and Criminal Law: Criminology and Criminal Law Course Police: Criminology and Criminal Law Level 5 Unlock your potential with our Police: Criminology and Criminal Law Level 5 course! Whether you're looking to start a career at the intersection of psychology and law enforcement or enhance your current skills, this Criminology course is designed for you. Gain a deep understanding of Criminology through modules that cover forensic science, victimology, and crime types. Learn the fundamentals of criminal psychology and the criminal justice system in England and Wales. Elevate your expertise with top-notch instruction in Criminology. Enrol today in our Criminology Level 5 Diploma and take your first step toward success! Who is this course for? Police: Criminology and Criminal Law Level 5 For people who are interested in learning about criminology and profiling and pursuing a career in these sectors, this Police: Criminology and Criminal Law Level 5 course is the best option. Requirements Police: Criminology and Criminal Law Level 5 To enrol in this Criminology and Criminal Law Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Criminology and Criminal Law Course. Be energetic and self-motivated to complete our Criminology and Criminal Law Course. Basic computer Skill is required to complete our Criminology and Criminal Law Course. If you want to enrol in our Criminology and Criminal Law Course, you must be at least 15 years old. Career path Police: Criminology and Criminal Law Level 5 You might be able to pursue a number of attractive job prospects after completing this Police: Criminology and Criminal Law Level 5 course, including: Detectives, Crime Journalists, Crime Reporters, Attorneys, Psychologists, and Counselors.
Are you ready to embark on an enlightening journey of wisdom with the Fire Safety & Gas Safety bundle, and pave your way to an enriched personal and professional future? If so, then Step into a world of knowledge with our course bundle - Fire Safety, Gas Safety & Firefighter Training. Delve into eight immersive CPD Accredited courses, each a standalone course: Course 01: Online Fire Safety Course Course 02: Fire Warden Training Course 03: Firefighter Training Course 04: Fire Extinguisher - Online Course Course 05: Gas Safety Course 06: Advanced Electrical Safety Course 07: Oxygen First Aid Training - Online Course Course 08: Level 2 Health and Safety in the Workplace Traverse the vast landscapes of theory, unlocking new dimensions of understanding at every turn. Let the Fire Safety, Gas Safety & Firefighter Training bundle illuminate your path to wisdom. The Fire Safety, Gas Safety & Firefighter Training bundle offers a comprehensive exploration into a rich tapestry of vast knowledge across five carefully curated courses. The journey is designed to enhance your understanding and critical thinking skills. Each course within the bundle provides a deep-dive into complex theories, principles, and frameworks, allowing you to delve into the nuances of the subject matter at your own pace. In the framework of the Fire Safety, Gas Safety & Firefighter Training package, you are bestowed with complimentary PDF certificates for all the courses included in this bundle, all without any additional charge. Adorn yourself with the Fire Safety & Gas Safety bundle, empowering you to traverse your career trajectory or personal growth journey with self-assurance. Register today and ignite the spark of your professional advancement! So, don't wait further and join the Fire Safety, Gas Safety & Firefighter Training community today and let your voyage of discovery begin! Learning Outcomes: Attain a holistic understanding in the designated areas of study with the Fire Safety & Gas Safety bundle. Establish robust bases across each course nestled within the Fire Safety & Gas Safety bundle. Decipher intricate concepts through the articulate content of the Fire Safety & Gas Safety bundle. Amplify your prowess in interpreting, scrutinising, and implementing theories. Procure the capacity to engage with the course material on an intellectual and profound level. Become proficient in the art of problem-solving across various disciplines. Stepping into the Fire Safety & Gas Safety bundle is akin to entering a world overflowing with deep theoretical wisdom. Each course within this distinctive bundle is an individual journey, meticulously crafted to untangle the complex web of theories, principles, and frameworks. Learners are inspired to explore, question, and absorb, thus enhancing their understanding and honing their critical thinking skills. Each course invites a personal and profoundly enlightening interaction with knowledge. The Fire Safety & Gas Safety bundle shines in its capacity to cater to a wide range of learning needs and lifestyles. It gives learners the freedom to learn at their own pace, forging a unique path of discovery. More than just an educational journey, the Fire Safety & Gas Safety bundle fosters personal growth, enabling learners to skillfully navigate the complexities of the world. The Fire Safety & Gas Safety bundle also illuminates the route to a rewarding career. The theoretical insight acquired through this bundle forms a strong foundation for various career opportunities, from academia and research to consultancy and programme management. The profound understanding fostered by the Fire Safety & Gas Safety bundle allows learners to make meaningful contributions to their chosen fields. Embark on the Fire Safety & Gas Safety journey and let knowledge guide you towards a brighter future. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Fire Safety & Gas Safety Individuals keen on deepening their firm understanding in the respective fields. Students pursuing higher education looking for comprehensive theory modules. Professionals seeking to refresh or enhance their knowledge. Anyone with a thirst for knowledge and a passion for continuous learning. Requirements To enrol in this Fire Safety, Gas Safety & Firefighter Training course, all you need is a basic understanding of the English Language and an internet connection. Career path Armed with the Fire Safety & Gas Safety bundle, your professional journey can reach new heights. The comprehensive theoretical knowledge from this bundle can unlock diverse career opportunities across several fields. Whether it's academic research, consultancy, or programme management, the Fire Safety & Gas Safety bundle lays a solid groundwork. Certificates CPD QS PDF Certificates Digital certificate - £4.99 CPD QS Hardcopy Certificate Hard copy certificate - £11.99
Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges
Course Overview The Hospitality Management Level 5 course offers a comprehensive insight into the dynamic and fast-paced world of hospitality. Designed to build a strong foundation in management practices, service excellence, and operational efficiency, the course equips learners with the knowledge and leadership skills required for success in the industry. Covering critical areas such as front office operations, food and beverage management, customer satisfaction, and marketing in travel and tourism, it ensures a well-rounded understanding of hospitality business functions. The curriculum also embraces modern developments such as e-hospitality and the use of technology in operations. Upon completion, learners will have developed key competencies in managing service quality, human resources, and financial aspects of hospitality enterprises. This qualification is ideal for those seeking career progression or wishing to enter this vibrant sector, offering valuable insights into creating memorable guest experiences and efficient business practices within hotels, resorts, and related hospitality organisations. Course Description The Hospitality Management Level 5 course delves deeper into the essential principles, operational challenges, and strategic approaches within the hospitality sector. Learners will explore the structure and evolution of the hotel industry, the importance of efficient recruitment and training processes, and the management of core areas including front office, housekeeping, food and beverage, and security operations. In addition, the programme highlights the significance of customer satisfaction, quality service delivery, marketing strategies, and financial management within hospitality environments. Contemporary topics such as e-hospitality and technology adoption are also integrated to reflect current industry trends. Throughout the course, participants will gain valuable knowledge, analytical capabilities, and management techniques that are crucial for sustaining high service standards and fostering business growth. The course structure is designed to cater to a wide range of learners, providing the flexibility to support both career advancement and entry into this dynamic field. Course Modules Module 01: Introduction to Hospitality Management Module 02: An Overview of Hotel Industry Module 03: The Process of Selection and Recruitment in Hospitality Industry Module 04: The Process of Development and Training in Hospitality Industry Module 05: Management of Front Office Operations Module 06: Management of Housekeeping, Engineering and Security Operations Module 07: Management of Food and Beverage Operations Module 08: Management of Service Quality in Hospitality Industry Module 09: Marketing in Travel and Tourism Business Module 10: Accounting in Hospitality Industry Module 11: Customer Satisfaction Module 12: E-Hospitality and Technology (See full curriculum) Who is this course for? Individuals seeking to start a career in hospitality management. Professionals aiming to enhance their expertise in hospitality leadership and operations. Beginners with an interest in the hospitality and tourism industries. Entrepreneurs planning to launch or manage hospitality ventures. Employees wishing to transition into supervisory or management roles within hospitality. Career Path Hotel Manager Front Office Manager Food and Beverage Manager Guest Relations Manager Hospitality Operations Manager Housekeeping Manager Resort Manager Travel and Tourism Consultant Event Coordinator within Hospitality Industry Hospitality and Tourism Marketing Executive
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity
Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00
This course is the ultimate resource for developers of all levels looking to master Express Framework, SQL, and the powerful combination of Passport.js and Auth0. Whether you are starting out with web development or working in the field for years, this course will provide you with the skills and knowledge you need in order to build robust, dynamic web applications.