Duration 1 Days 6 CPD hours This course is intended for Sales Legal Marketing Business analysts Project managers AWS Academy students Other IT-related professionals Overview Summarize the working definition of AWS Differentiate between on-premises, hybrid-cloud, and all-in cloud Describe the basic global infrastructure of the AWS Cloud Explain the six benefits of the AWS Cloud Describe and provide an example of the core AWS services, including compute, network, databases, and storage Identify an appropriate solution using AWS Cloud services with various use cases Describe the AWS Well-Architected Framework Explain the shared responsibility model Describe the core security services within the AWS Cloud Describe the basics of AWS Cloud migration Articulate the financial benefits of the AWS Cloud for an organization?s cost management Define the core billing, account management, and pricing models Explain how to use pricing tools to make cost-effective choices for AWS services This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam. Prerequisites General IT technical knowledge, General IT business knowledge 1 - Introduction to Amazon Web Services Summarize the benefits of AWS Describe differences between on-demand delivery and cloud deployments Summarize the pay-as-you-go pricing model 2 - Compute in the Cloud Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level Identify the different Amazon EC2 instance types Differentiate between the various billing options for Amazon EC2 Describe the benefits of Amazon EC2 Auto Scaling Summarize the benefits of Elastic Load Balancing Give an example of the uses for Elastic Load Balancing Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) Summarize additional AWS compute options 3 - Global Infrastructure and Reliability Summarize the benefits of the AWS Global Infrastructure Describe the basic concept of Availability Zones Describe the benefits of Amazon CloudFront and Edge locations Compare different methods for provisioning AWS services 4 - Networking Describe the basic concepts of networking Describe the difference between public and private networking resources Explain a virtual private gateway using a real life scenario Explain a virtual private network (VPN) using a real life scenario Describe the benefit of AWS Direct Connect Describe the benefit of hybrid deployments Describe the layers of security used in an IT strategy Describe which services are used to interact with the AWS global network 5 - Storage and Databases Summarize the basic concept of storage and databases Describe benefits of Amazon Elastic Block Store (Amazon EBS) Describe benefits of Amazon Simple Storage Service (Amazon S3) Describe the benefits of Amazon Elastic File System (Amazon EFS) Summarize various storage solutions Describe the benefits of Amazon Relational Database Service (Amazon RDS) Describe the benefits of Amazon DynamoDB Summarize various database services 6 - Security Explain the benefits of the shared responsibility model Describe multi-factor authentication (MFA) Differentiate between the AWS Identity and Access Management (IAM) security levels Describe security policies at a basic level Explain the benefits of AWS Organizations Summarize the benefits of compliance with AWS Explain primary AWS security services at a basic level 7 - Monitoring and Analytics Summarize approaches to monitoring your AWS environment Describe the benefits of Amazon CloudWatch Describe the benefits of AWS CloudTrail Describe the benefits of AWS Trusted Advisor 8 - Pricing and Support Understand AWS pricing and support models Describe the AWS Free Tier Describe key benefits of AWS Organizations and consolidated billing Explain the benefits of AWS Budgets Explain the benefits of AWS Cost Explorer Explain the primary benefits of the AWS Pricing Calculator Distinguish between the various AWS Support Plans Describe the benefits of AWS Marketplace 9 - Migration and Innovation Understand migration and innovation in the AWS Cloud Summarize the AWS Cloud Adoption Framework (AWS CAF) Summarize six key factors of a cloud migration strategy Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile Summarize the broad scope of innovative solutions that AWS offers Summarize the five pillars of the AWS Well-Architected Framewor 10 - AWS Certified Cloud Practitioner Basics Determine resources for preparing for the AWS Certified Cloud Practitioner examination Describe benefits of becoming AWS Certified
Any organisation that processes, transmits or stores payment card data must comply with PCI DSS. Failure to comply will result in heavy fines, restrictions or permanent expulsion from the payment card acceptance programme. This course describes the Payment Card Industry Data Security Standard (PCI DSS) and explains what you need to be aware of and when to take action to be PCI DSS compliant.
Cybercriminals are increasingly relying on user error to perpetrate attacks. Employees are, therefore, the first line of defense when it comes to protecting your organization. One crucial step in making sure that everyone in your organization is prepared to keep your networks secure is for them to know what attacks look like. The five most common workplace computer attacks are explored in this video, along with how to spot and prevent them. Learning Objectives Identify the various forms of cyber crime and learn how to spot potential risks, enabling you to protect your computer and personal information effectively.;Recognize and respond to the five most common types of attempted cyber security attacks.;Explore the concept of denial of service (DoS) attacks and the dangers of typosquatting, equipping you with the ability to detect potential threats and contribute to overall cybersecurity resilience.
Duration 4 Days 24 CPD hours This course is intended for The App Maker builds solutions to simplify, automate, and transform tasks and processes for themselves and their team where they have deep expertise in the solution business domain. They have basic data modeling, user experience design, requirements analysis, and process analysis skills. The App Maker creates and enforces business processes, structures digital collection of information, improves efficiency of repeatable tasks, and automates business processes. The App Maker uses the Maker tools of Power Platform to solve business problems. They may use advanced features of Microsoft apps and third-party productivity tools. The App Maker is aware of the capabilities and limitations of available tools and understands how to apply them. The App Maker is self-directed, and solution focused. They may not have formal IT training but are comfortable using technology to solve business problems with a personal growth mindset. They understand the operational need and have a vision of the desired outcome. They approach problems with phased and iterative strategies. This course will teach you how to build apps with low-code techniques to simplify, automate, and transform business tasks and processes using Microsoft Power Platform. This course contains a 1-day Applied Workshop. This workshop will allow you to practice your App Maker skills by creating an end-to-end solution to solve a problem for a fictitious company. The solution will include a Microsoft Dataverse database, Power Apps canvas app, and Power Automate flows. 1 - Get started with Microsoft Power Platform for app makers Identify components Create apps Get started with Microsoft Dataverse Work with Copilot in Microsoft Power Platform 2 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 3 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 4 - Load/export data and create data views in Dataverse View data in a table Create or edit views of data in a table Dataverse data import options Load data into a table Dataverse data export options Export Add, update, or delete data in a table by using Excel Import data using Power Query 5 - Export data from Dataverse and use Microsoft Excel to edit records Export data to Excel Edit and update data in Excel 6 - Get started with Microsoft Dataverse for Teams Dataverse for Teams vs Dataverse Provision your first Dataverse environment Create your first table to store data 7 - Build your first app with Power Apps and Dataverse for Teams Create your first app with the hero template Customize your app with Power Apps Studio Publish your app Install template apps 8 - Build your first workflow with Power Automate and Dataverse for Teams Types of workflows that Power Automate can build in Dataverse Schedule a flow 9 - Create reports with Power BI and Dataverse for Teams Connect to and transform Dataverse for Teams data from Power BI Create a Power BI report Publish the report Share the data 10 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 11 - Explore what Power BI can do for you What can I do with the Power BI service as a consumer? View content in the Power BI service Collaborate and share in Power BI Find and view dashboards and reports 12 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 13 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 14 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 15 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Secure, publish, and share data in Power BI Share and use reports in Power BI Row-level security Publish a report to a Power BI workspace Share reports and user experience Protect data in Power BI Data refresh and alerts 18 - Embed Power BI content Embed Power BI reports Embed other Power BI content types Optimize the embedding experience 19 - How to build your first model-driven app with Dataverse Model-driven apps, powered by Microsoft Dataverse Explore sample apps 20 - Get started with model-driven apps in Power Apps Introducing model-driven apps Components of model-driven apps Design model-driven apps Incorporate business process flows 21 - Configure forms, charts, and dashboards in model-driven apps Forms overview Form elements Configure multiple forms Use specialized form components Configure views overview Configure grids Create and edit views Configure charts overview Dashboards overview Use interactive streams and tiles 22 - Manage Dynamics 365 model-driven app settings and security Configure role-based security Manage teams and business units Explore settings and customizations 23 - Use specialized components in a model-driven form Create business process flows Embed a canvas app in a model-driven form Add a timeline in a model-driven form Create a report in a model-driven form 24 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 25 - Customize a canvas app in Power Apps Improve your app by making basic customizations Explore controls and screens in canvas apps 26 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 27 - Navigation in a canvas app in Power Apps Understanding navigation The Navigate and Back functions More ways to use the Navigate function 28 - Manage apps in Power Apps Power Apps review 29 - Build a mobile-optimized app from Power Apps Learn about mobile-optimized apps Identify components to make a canvas app mobile-optimized Create a mobile-optimized app that uses responsive designs Identify performance considerations for a mobile-optimized canvas app 30 - Use and understand Controls in a canvas app in Power Apps Core properties of controls Entering and displaying data with text controls Additional controls for enhancing your app's usability Media Modern controls Work with component libraries 31 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 32 - Use imperative development techniques for canvas apps in Power Apps Imperative versus declarative development The three types of variables in Power Apps Global variables Contextual variables Collections Additional variable concepts 33 - Manage apps in Power Apps Power Apps review 34 - Create formulas to change properties in a Power Apps canvas app Formulas overview Use a formula to modify the format of controls Use formulas to perform calculations Use a control to modify the property of other controls Conditional formatting Functions for validating data 35 - Create formulas to change behaviors in a Power Apps canvas app Formulas and functionality Understanding true and false Understanding control behaviors and actions Performing multiple actions in a formula Control the display mode through a formula Use controls and functions to create a dynamic formula 36 - Author a basic formula that uses tables and records in a Power Apps canvas app Records and tables Using the Table function Store a table Filter your table Use the lookup function to return a record Additional table functions 37 - Build a canvas app for a real estate solution with Copilot in Power Apps 38 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 39 - Build approval flows with Power Automate Provide solutions to real-world scenarios. 40 - Build flows to manage user information 41 - Power Automate's deep integration across multiple data sources 42 - Use the Admin center to manage environments and data policies in Power Automate Administer flows Export and import flows Learn how to distribute button flows 43 - Use AI Builder in Power Automate AI Builder in Power Automate saves time Advanced usage of AI Builder in Power Automate 44 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 45 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 46 - Build flows for a real estate solution using Copilot in Power Automate When to use Copilot in Power Automate 47 - Use Dataverse triggers and actions in Power Automate Dataverse triggers Query data Create, update, delete, and relate actions 48 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 49 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 50 - Get started with Power Apps canvas apps Start Power Apps Power Apps data sources Use Power Apps with Power Automate and Power BI Designing a Power Apps app 51 - How to build the User Interface in a canvas app in Power Apps Use themes to quickly change the appearance of your app Brand a control Icons Images Personalization Build for phones or tablets 52 - Get started with Power Automate Introducing Power Automate Create your first flow Troubleshoot flows 53 - Challenge Project - Build a booking requests app with Power Apps and Power Automate Prepare
Welcome to the Learn Ethical Hacking From A-Z: Beginner To Expert course! This practical course was designed for beginners or those with no prior experience or knowledge in hacking or cybersecurity. The goal of this course is to teach you not only what and how hackers do but also how to hack systems like a pro and win the cat-and-mouse game by securing systems like a professional security expert. We take you from the beginnings of ethical hacking to mastery by combining practical work with good theoretical training, providing you with the training you need to hack and secure against a hack. While theory is important, we recognise that it can sometimes be boring and uninspiring. As a result, this course is jam-packed with examples that you can use, making the lessons more fun and engaging. This practical approach begins with a lesson on Networking Basics and how to install the necessary software (Windows, Linux, and Mac OSX) before diving right into hacking. Throughout, you will examine and exploit many systems ranging from simple websites to large networks, as well as hacking servers and clients. In addition to hacking, you'll learn how to execute effective penetration testing procedures. This approach provides you with the fundamental knowledge required not only to hack any given system but also to secure it, with each lesson covering both sides of the coin. It's a complete course, so you won't have to look elsewhere to learn. Don't waste any more time. Enrol today and be on your way to becoming a hacking expert. Learning Outcomes: Upon completion of the Learn Ethical Hacking From A-Z course, you will be able to: Understand the fundamentals of ethical hacking and its applications. Build a secure hacking lab for practical experimentation and learning. Master essential networking concepts for effective penetration testing. Develop proficiency in Linux, Python, Bash, and PowerShell for hacking tasks. Learn techniques to remain anonymous and protect your online identity. Gain expertise in hacking into WIFI networks and securing them. Conduct passive and active reconnaissance for effective information gathering. Acquire skills in website and web application hacking for vulnerability assessment. Who is this course for: This Learn Ethical Hacking From A-Z course is perfect for: Tech enthusiasts eager to expand their knowledge in ethical hacking. Individuals aspiring to start a career in cybersecurity and ethical hacking. IT professionals seeking to enhance their skill set in cybersecurity. Students pursuing computer science or related fields interested in ethical hacking. Security professionals looking to broaden their expertise in penetration testing. Why buy this Learn Ethical Hacking From A-Z course? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one-to-one assistance when needed Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript immediately Easily learn the skills and knowledge from the comfort of your home Career Path: Our Learn Ethical Hacking From A-Z course will prepare you for a range of careers, including: Junior Penetration Tester: £25,000 - £50,000 Annually Ethical Hacker: £40,000 - £100,000 Annually Security Consultant: £50,000 - £90,000 Annually Security Engineer: £60,000 - £110,000 Annually Senior Penetration Tester: £70,000 - £120,000 Annually Chief Information Security Officer (CISO): £100,000 - £180,000 Annually Certification After studying the course materials of the Learn Ethical Hacking From A-Z: Beginner To Expert course, there will be a written assignment test which you can take either during or at the end of the course. After passing the test, you will have a range of certification options. A CPD Accredited PDF Certificate costs £4.99, while a CPD Accredited Hardcopy Certificate is £8.00. We also offer transcript services. A PDF Transcript costs £4.99, and a Hardcopy Transcript is £9.99. Select according to your needs, and we assure timely delivery of your chosen certificate. Requirements This professionally designed Learn Ethical Hacking From A-Z: Beginner To Expert course does not require you to have any prior qualifications or experience. It is open to everyone, and you can access the course from anywhere at any time. Just enrol and start learning!
Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Prepare for the AWS Certified Solutions Architect - Associate (SAA-C03) exam. Learn about the AWS Management Console, S3 buckets, instances, database services, cloud security, costs associated with AWS, Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS).
Description: You live and work at the forefront of information security. Every day malicious hackers grow smarter. You always have to stay one step ahead to keep your company safe. This course will be very beneficial for you in that case. This Functional Skills - Maths (Level 3) covers everything you need to know about becoming a Certified Information Systems Security Professional. Here will learn about security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. This cybersecurity certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of cybersecurity leaders. It shows you have all it takes to design, engineer, implement and run an information security program. So, are you up for the challenge? If yes, then you get this course to become more skilled and an expert. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Functional Skills - Maths (Level 3) is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Functional Skills - Maths (Level 3) is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Course Content Ratio and Proportion Lecture 1 Introduction 00:02:00 Lecture 2 Multiplying any digit number by 11, 22, and 33 00:09:00 Lecture 3 Integers and ordering of integers 00:06:00 Lecture 4 Addition and Subtractions of Integers 00:07:00 Lecture 5 Operations on Integers 00:04:00 Lecture 6 Multiplication and Division of Integers 00:04:00 Lecture 7 Powers of Integers (Exponents) 00:04:00 Factors and Multiples Lecture 8 Complete knowledge about factors and multiples 00:06:00 Lecture 9 Divisibility tests for 2,3,4,5,6 00:07:00 Lecture 10 Divisibility rules 7,8,9,10,11 00:06:00 Lecture 11 Prime Factorization 00:06:00 Lecture 12 Highest Common Factor HCF 00:10:00 Lecture 13 Least Common Multiple LCM 00:16:00 Lecture 14 Relation between LCM and HCF 00:04:00 Factors Lecture 15 Classification of Fractions 00:04:00 Lecture 16 Convert mixed to improper and improper to mixed fractions 00:03:00 Lecture 17 Equivalent Fractions 00:04:00 Lecture 18 Comparing Fractions after converting to like fractions 00:09:00 Lecture 19 Reducing a fraction to lowest term1 00:04:00 Lecture 20 Addition and subtraction OF fractions 00:08:00 Lecture 21 Multiplication and division of fractions 00:11:00 Lecture 22 Word problems on fractions 00:16:00 Simplification Rule : BODMAS Lecture 23 BODMAS and rules to remove brackets 00:03:00 Lecture 24 Simplify expressions using BODMAS rules 00:05:00 Lecture 25 Simplify expressions involving fractions using BODMAS 00:07:00 Decimal numbersFractions Lecture 26 Decimal numbers in relation to fractions 00:08:00 Lecture 27 Like and unlike Decimals 00:05:00 Lecture 28 Ordering of Decimal numbers 00:10:00 Lecture 29 Addition and subtraction of Decimal 00:07:00 Lecture 30 Multiplication of Decimal 00:03:00 Lecture 31 Division of Decimal 00:05:00 Rational Numbers Lecture 32 Rational number 00:02:00 Lecture 33 Representation of Rational Numbers on Number line 00:04:00 Lecture 34 Determining which fraction is terminating or non terminating 00:05:00 Lecture 35 shortcut method of writing decimal expansion of fraction to decimal 00:08:00 Approximation Lecture 36 Rounding to whole number 00:06:00 Lecture 37 Rounding to required number of decimals (1 d.p. ) 00:05:00 Lecture 38 rounding to significant digits 00:07:00 Lecture 39 Practice question on three methods of approximation 00:05:00 Estimation and Scientific Notation or Standard form Lecture 40 Estimation 00:05:00 Lecture 41 Scientific Notation 00:07:00 Lecture 42 Operation on numbers when they are in scientific notation 00:06:00 Percentage Lecture 43 Percentage to fraction and fraction to percentage 00:06:00 Lecture 44 Percentage of a quantity and conversation to decimal 00:06:00 Lecture 45 Expressing one quantity as percentage of another quantity 00:06:00 Lecture 46 Finding increase decrease percent 00:05:00 Lecture 47 Uses of percentages-Word Problems 00:09:00 Ratio and Proportion Lecture 48 Ratio- How to express as simple ratio1 00:09:00 Lecture 49 How to compare Ratios 00:04:00 Lecture 50 Word problems on finding ratios 00:07:00 Lecture 51 To divide a given quantity into a given Ratio 00:11:00 Lecture 52 Proportion 00:04:00 Lecture 53 Practice problems on Proportion 00:06:00 Lecture 54 Continued proportion 00:06:00 Integers ( Directed Numbers) Lecture 55 Direct Variation ( or proportion) 00:04:00 Lecture 56 Problems based on Direct proportion 00:10:00 Lecture 57 Inverse Variation ( or proportion) 00:10:00 Lecture 58 Multiple Ratios 00:10:00 Profit , Loss, discount and Tax Lecture 59 Basics - Profit and Los 00:04:00 Lecture 60 More practice problems on Profit & Loss 00:06:00 Lecture 61 Selling price formula and Problems1 00:04:00 Lecture 62 Cost price formula and Problems 00:03:00 Lecture 63 Higher problems on Profit and Loss 00:08:00 Lecture 64 Basics - Discount 00:05:00 Lecture 65 Practice problems on Discount 00:04:00 Lecture 66 Tax 00:06:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.