• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

275 Shell courses in Leeds delivered On Demand

Ethical Hacking with Kali Linux

4.9(27)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Electrical Machines for Electrical Engineering

4.9(27)

By Apex Learning

Overview This comprehensive course on Electrical Machines for Electrical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Electrical Machines for Electrical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Electrical Machines for Electrical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Electrical Machines for Electrical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 8 sections • 108 lectures • 14:20:00 total length •Module 1- Introduction to Electric Machines: 00:03:00 •Module 2- Types of Electric Machines and Principle of Electrical Generation: 00:09:00 •Module 1- Importance and Construction of DC Machines: 00:26:00 •Module 2- Armature Winding and EMF Equation: 00:40:00 •Module 3-Solved Example 1: 00:05:00 •Module 4-Solved Example 2: 00:04:00 •Module 5-Solved Example 3: 00:07:00 •Module 6-Solved Example 4: 00:06:00 •Module 7-Separately Excited DC Machine: 00:21:00 •Module 8-Shunt and Series DC Machines: 00:25:00 •Module 9-Solved Example 1 on Separately Excited DC Machine: 00:07:00 •Module 10-Solved Example 2 on Separately Excited DC Machine: 00:07:00 •Module 11-Solved Example 3 on Shunt Generator: 00:04:00 •Module 12-Solved Example 4 on Shunt Generator: 00:07:00 •Module 13-Solved Example 5 on Series DC Generator: 00:06:00 •Module 14-Types and Applications of Compound DC Motors: 00:07:00 •Module 15- Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor: 00:33:00 •Module 16- Torque-Speed Characteristics of Series DC Motor: 00:08:00 •Module 17-Solved Example 1 on Speed Control: 00:08:00 •Module 18-Solved Example 2 on Speed Control: 00:06:00 •Module 19- Starting of DC Machine: 00:14:00 •Module 20- Armature Reaction in DC Machines: 00:10:00 •Module 21-Losses in DC Machines: 00:04:00 •Module 1- What is a Transformer: 00:02:00 •Module 2- Importance of Transformer: 00:04:00 •Module 3-Iron Core of Transformer: 00:04:00 •Module 4- Magnetic Circuit Inside Transformer: 00:05:00 •Module 5- Windings of Transformer: 00:03:00 •Module 6- Why are Windings Made of Copper: 00:01:00 •Module 7- Classification of Windings: 00:05:00 •Module 8- Insulating Material and Transformer Oil: 00:02:00 •Module 9- Conservator of Transformer: 00:03:00 •Module 10- Breather of Transformer: 00:04:00 •Module 11- Bushings of Transformer: 00:04:00 •Module 12- Tap Changer of Transformer: 00:03:00 •Module 13- Cooling Tubes of Transformer: 00:01:00 •Module 14- Buchholz Relay of Transformer: 00:02:00 •Module 15- Explosion Vent: 00:02:00 •Module 16- Methods of Cooling: 00:03:00 •Module 17-Types of Transformers: 00:03:00 •Module 18- Power Transformer and Distribution Transformer: 00:05:00 •Module 19- Single Phase Core Type Transformer: 00:04:00 •Module 20-Single Phase Shell Type Transformer: 00:05:00 •Module 21- 3 Phase Core Type: 00:02:00 •Module 22- 3 Phase Shell Type: 00:01:00 •Module 23- Comparison between Shell and Core CSA: 00:01:00 •Module 24- Comparison between Shell and Core Type: 00:01:00 •Module 25- Notes: 00:03:00 •Module 26-Video Explaining The Components in 3D and Real Life: 00:05:00 •Module 1- Introduction to Magnetic Circuits: 00:02:00 •Module 2- Induced Emf and Current: 00:04:00 •Module 3- Ampere Right Hand Rule: 00:04:00 •Module 4- Magnetic Circuit and Important Definitions: 00:06:00 •Module 5- Linear and Non Linear Materials: 00:03:00 •Module 6-Flux Linkage and Reluctance: 00:04:00 •Module 7- Analogy between Electric and Magnetic Circuits: 00:06:00 •Module 8- Fringing Effect: 00:02:00 •Module 9- Example 1 Magnetic Circuits: 00:07:00 •Module 10- Example 2: 00:03:00 •Module 11- Example 3: 00:06:00 •Module 12- Application on Magnetic Circuit - Transformers: 00:04:00 •Module 1- Introduction to Transformers: 00:02:00 •Module 2- Construction of Transformer: 00:02:00 •Module 3-Theory of Operation: 00:04:00 •Module 4- Ideal Transformer: 00:05:00 •Module 5-Non Ideal Transformer: 00:02:00 •Module 6- Effect of Loading on Transformer: 00:03:00 •Module 7- Transformer Regulation: 00:03:00 •Module 8- Transformer Losses: 00:03:00 •Module 9- Transformer Efficiency: 00:05:00 •Module 10- Transformer Rating: 00:02:00 •Module 11- Question 1: 00:01:00 •Module 12- Question 2: 00:02:00 •Module 13- Question 3: 00:01:00 •Module 14- Example 1: 00:01:00 •Module 15- Voltage Relation of Transformer: 00:04:00 •Module 16- Transformer Exact Equivalent Circuit: 00:06:00 •Module 17- Concept of Refereeing: 00:04:00 •Module 18- Approximate Equivalent Circuit: 00:02:00 •Module 1- Construction and Principle of Operation of Synchronous Generator: 00:29:00 •Module 2- Principle of Operation of Synchronous Motor: 00:24:00 •Module 3- Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine: 00:29:00 •Module 4-Solved Example 1 on Non Salient Machine: 00:05:00 •Module 5-Solved Example 2 on Non Salient Machine: 00:11:00 •Module 6-Solved Example 3 on Non Salient Machine: 00:07:00 •Module 7- Solved Example 4 on Non Salient Machine: 00:04:00 •Module 8-Solved Example 5 on Non Salient Machine: 00:07:00 •Module 9-Solved Example 6 on Non Salient Machine: 00:03:00 •Module 10- Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine: 00:39:00 •Module 11-Solved Example 1 on Salient Machine: 00:09:00 •Module 12- Solved Example 2 on Salient Machine: 00:05:00 •Module 13-Solved Example 3 on Salient Machine: 00:10:00 •Module 14- Parallel Operation of Two Generators: 00:17:00 •Module 15- Synchronization of Machine with Grid: 00:10:00 •Module 1- Construction and Theory of Operation of Induction Machines: 00:27:00 •Module 2- Equivalent Circuit and Power Flow in Induction Motor: 00:23:00 •Module 3- Torque-Speed Characteristics of Induction Motor: 00:20:00 •Module 4- Solved Example 1 on Induction Motor: 00:08:00 •Module 5-Solved Example 2 on Induction Motor: 00:06:00 •Module 6-Solved Example 3 on Induction Motor: 00:06:00 •Module 7-Solved Example 4 on Induction Motor: 00:18:00 •Module 8-Solved Example 5 on Induction Motor: 00:13:00 •Module 9- Methods of Speed Control of Induction Motor: 00:27:00 •Module 10- Methods of Starting of Induction Motor: 00:21:00 •Module 11-Solved Example on Motor Starter: 00:15:00 •Module 12- Principle of Operation of Doubly Fed Induction Generator: 00:11:00 •Module 13-Self Excited Induction Generator: 00:08:00 •Assignment - Electrical Machines for Electrical Engineering: 00:00:00

Electrical Machines for Electrical Engineering
Delivered Online On Demand14 hours 20 minutes
£12

IT: CompTIA with Cyber Security Career Oriented Job Focused Program - Money Back Guarantee

4.9(27)

By Apex Learning

Defend, Excel, Succeed: Unleash Your Potential with IT: CompTIA with Cyber Security program. Dive into IT excellence and cyber resilience with our exclusive IT: CompTIA with Cyber Security program. Elevate your career prospects and knowledge with our comprehensive curriculum to pave the way for success. Our IT: CompTIA with Cyber Security program is a stepping stone, guiding you toward a fulfilling career. With technology shaping industries, the demand for skilled professionals is at an all-time high. This program, spanning multiple courses, is tailored to equip you with the expertise employers demand across diverse sectors. Delve into cutting-edge subjects such as CompTIA A+, Cloud Computing, Cybersecurity Analyst, PenTest+, and more. Moreover, we're your dedicated partners in this exciting IT: CompTIA with Cyber Security program. Our goal isn't just to teach you; it's to support you 24/7 so you can get closer to your dream job. We're so confident with our program that we offer a 100% money-back guarantee, ensuring your complete satisfaction. Learning Outcomes: By completing this IT: CompTIA with Cyber Security program, you will gain the following: Master CompTIA A+ essentials (220-1001 and 220-1002). Understand Cloud Computing principles (CompTIA Cloud+). Analyse and counteract cybersecurity threats (CompTIA CySA+). Conduct ethical hacking with CompTIA PenTest+. Attain a robust grasp of IT fundamentals and networking. Excel in Linux systems and Bash scripting. Develop skills in incident handling and response. Cultivate cyber awareness through online courses Explore Linux & ethical hacking using Kali Linux Master Bash scripting, Linux, and shell programming Become a skilled IT support technician Progress to network security level 2 & functional IT skills Craft a compelling CV and master job searching Ace interviews with expert guidance Navigate video job interviews effectively Create a standout LinkedIn profile Courses Included in the Program Enrol in our IT: CompTIA with Cyber Security program and gain access to a 25 comprehensive set of courses, including: => Course 01: CompTIA A+ (220-1001) => Course 02: CompTIA A+ (220-1002) => Course 03: Cloud Computing / CompTIA Cloud+ (CV0-002) => Course 04: CompTIA CySA+ Cybersecurity Analyst (CS0-002) => Course 05: CompTIA PenTest+ (Ethical Hacking) => Course 06: CompTIA Security+ (SY0-601) => Course 07: CompTIA IT Fundamentals ITF+ (FCO-U61) => Course 08: CompTIA Networking - Level 4 => Course 09: CompTIA Healthcare IT Technician => Course 10: Cyber Security Incident Handling and Incident Response => Course 11: Cyber Security Advanced Training => Course 12: Cyber Security Awareness Training | Online Course => Course 13: Learn Linux in 5 Days => Course 14: Ethical Hacking with Kali Linux => Course 15: Bash Scripting, Linux and Shell Programming => Course 16: IT Support Technician Training => Course 17: Network Security Level 2 => Course 18: Functional Skills IT => Course 19: Data Protection and Data Security Level 2 => Course 20: Learning Computers and Internet Level 2 => Course 21: Career Development Plan Fundamentals => Course 22: CV Writing and Job Searching => Course 23: Interview Skills: Ace the Interview => Course 24: Video Job Interview for Job Seekers => Course 25: How to Create a Professional LinkedIn Profile Enrol in our highly regarded IT: CompTIA with Cyber Security program, featuring a job-relevant curriculum that ensures your skills align with employer expectations across various sectors. Don't miss this opportunity - your success story starts now! For any query, please feel free to contact us, and we will be glad to assist you. Venture on a transformative journey through our IT: CompTIA with Cyber Security program, meticulously crafted to empower you with cutting-edge IT skills and cybersecurity expertise. Elevate your career prospects with a curriculum designed to meet industry demands, providing a comprehensive understanding of the IT landscape. Why Choose Us? What sets us apart is our unwavering commitment to your success. Here's what you gain by joining our IT: CompTIA with Cyber Security program: Updated Materials: Stay current with industry trends: Our IT: CompTIA with Cyber Security program ensures you have access to the most up-to-date materials, guaranteeing a curriculum that reflects the latest technological advancements. Dive into the cutting-edge knowledge that empowers you to navigate the dynamic IT terrain confidently, equipping you for success in the fast-paced world of information technology. Flexible Timing: Learn at your own pace:Life can be unpredictable, but your learning journey doesn't have to be. Flexibility is critical with our IT: CompTIA with Cyber Security program. Learn at your own pace, whether you're a full-time professional, a student, or someone managing various commitments. Our program adapts to your schedule, allowing you to delve into the intricacies of IT and cyber security without compromising your existing responsibilities. No Hidden Cost: Certification and course materials are inclusive. Transparency is the cornerstone of our IT: CompTIA with Cyber Security program. We believe in providing a seamless learning experience without any financial surprises. Your enrollment covers the comprehensive certification process and all necessary course materials. Say goodbye to hidden costs and embrace a straightforward, all-inclusive educational journey. Money-Back Guarantee: Enjoy peace of mind within 14 days: With our IT: CompTIA with Cyber Security program, your peace of mind is our priority. Take the first two weeks to explore the curriculum and experience the quality of our offerings. If, for any reason, you feel this program isn't the right fit for you, enjoy the reassurance of our 100% money-back guarantee within 14 days of enrollment. Lifetime Access: Continued learning at your fingertips:Our commitment to your growth extends beyond completing the program. Enrol in IT: CompTIA with Cyber Security and gain lifetime access to course materials and updates. Keep your knowledge current, revisit critical concepts, and stay connected to the ever-evolving world of IT. Your journey doesn't end; it evolves with you. 24/7 Support: Assistance whenever you need it:Our IT: CompTIA with Cyber Security program provides 24/7 support, ensuring that assistance is readily available whenever you need it. Whether you have questions about the curriculum, encounter technical issues, or seek guidance on your learning path, our dedicated support team is just a message away, ready to provide the help you need. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT: CompTIA with Cyber Security program is for individuals who are: Aspiring IT professionals. Seeking to specialise in cybersecurity. Eager to enhance networking skills. Wishing to enter the healthcare IT sector. Interested in ethical hacking and penetration testing. Requirements No prior experience is required to enrol in IT: CompTIA with Cyber Security program. Career path Upon completion of IT: CompTIA with Cyber Security program, explore a multitude of career paths, including: Cybersecurity Analyst: £30,000 - £50,000 IT Support Technician: £25,000 - £40,000 Cloud Computing Specialist: £35,000 - £55,000 Network Security Specialist: £30,000 - £50,000 Healthcare IT Technician: £28,000 - £45,000 Linux Systems Administrator: £35,000 - £60,000 Certificates CPD Accredited (e-Certificate) Digital certificate - Included CPD Accredited (Hard Copy Certificate) Hard copy certificate - Included e-Transcript Digital certificate - Included Hard Copy Transcript Hard copy certificate - Included Student ID Card Digital certificate - Included

IT: CompTIA with Cyber Security Career Oriented Job Focused Program - Money Back Guarantee
Delivered Online On Demand
£209

Crochet For Beginners

4.3(43)

By John Academy

Description Learn easy and nice pattern with the step by step guides. Crochet is the name of a love. The history of Crochet is long. Probably your mother does this while you were in the womb. Crochet For Beginners course is the perfect course for the crochet lovers. Crochet is the handicraft of making a textured fabric by using a hooked needle. In this process, you will create fabric by interlocking loops of yarn, thread, or strands of other materials using a crochet hook. Using crochet, you can make cloth out of cotton, or design many other things. The course introduces you the necessary types of equipment for crochet such as types of hooks, yarn, etc. Then, you will learn how to read crochet charts and know to read the sign. For practical work, the course shows you some of the easy patterns such as creating a heart, granny square, triangle, filet blocks, circle, flower, and spiral shell. Upon completion, you will be able to do the above mention crochet pattern. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Crochet For Beginners is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Crochet For Beginners is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. What is crochet? What is it good for? Introduction FREE 00:05:00 How to Study 00:04:00 Hooks 00:04:00 What is Needed 00:01:00 Crochet Basics Holding the Hook 00:03:00 Slip Knot 00:01:00 Chain Stitch 00:03:00 Double Crochet 00:03:00 Treble Crochet 00:03:00 Half Treble Crochet 00:02:00 Double Treble Crochet 00:04:00 Triple Treble Crochet 00:03:00 Slip Stitch 00:04:00 Increase Decrease 00:04:00 Front Back Loop 00:04:00 FSC 00:05:00 Simple Crochet Items, Based on What We Already Know Triangle 00:12:00 Filet Crochet 00:12:00 Heart 00:13:00 Circle 00:09:00 Granny squares 00:13:00 Five Petal Flower 00:16:00 Spiral Shell 00:13:00 Goodbye 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Crochet For Beginners
Delivered Online On Demand2 hours 22 minutes
£18

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25

Python Level 1

By OnlineCoursesLearning.com

Python Certification Level 1 This course will show you the quickest, least demanding and most exhaustive involvement with learning essential Python. For those inspired by PC programming, the Python language is an extraordinary choice especially in view of its broad help libraries. Moreover, the program gives a ton of learning straightforwardness and backing. Python was made in the mid 90s to code with more prominent consistency, however with more effortlessness than Java. Viewed as a 'fun' language, Python can be a fascinating project, especially for the individuals who are innovative, as it offers numerous unique highlights. Programming advancement organizations like to work with the Python language as a result of its flexibility. How about we examine what this course will cover and what the numerous advantages are: In this course, you will learn: Step by step instructions to compose a code in Python Comprehend the Python Shell window and how to utilize it in 'intuitive' mode The different functionalities Step by step instructions to compose a proper program utilizing IDLE The advantage of documentation and why it is crucial to do so when coding The most effective method to utilize the altering stage's rules when composing a program The most effective method to print utilizing each type of information About extra altering highlights, for example, indenting a locale Comprehend the different factors and how the Python language utilizes them More departure capacities (\n, \t) utilized for organizing strings About 'if' articulations or conditionals to decide program stream About Python coherent administrators and how they cooperate with factors to finish and address articulations Around four circles and settled circles and the distinctions in their usefulness About complex information structures and tuples Step by step instructions to utilize python Course Benefits: Python gives you admittance to the huge irregular library Work on composing code by making strings Get time and schedule capacities inside Python and how to apply them See how Python functions with HTML structure and why this is so significant You can use efficiency and speed time It gives outsider modules

Python Level 1
Delivered Online On Demand
£50

The Complete Practical Docker Guide

By Packt

Understand how Docker works and learn its core features with this hands-on course. This is 90% practice without any useless demos! Learn how to create different containers such as Node.js, Python, WordPress, MongoDB, MySQL, Redis, Elasticsearch, and much more.

The Complete Practical Docker Guide
Delivered Online On Demand18 hours 29 minutes
£37.99

Practical Python: Learn Python Basics Step by Step - Python 3

By Packt

This course for beginners will help you build a solid foundation in programming with Python 3. We will cover core concepts such as Python statements, variables, data types, lists, typecasting, comments, conditional statements, loops, file handling, OOP concepts, and more. A carefully structured course with live demonstrations to get you started.

Practical Python: Learn Python Basics Step by Step - Python 3
Delivered Online On Demand3 hours 49 minutes
£41.99

Electrical Machines Online Course for Electrical Engineers - Bundle

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 1 to 2 hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about electrical machines Understand the core competencies and principles of electrical machines Explore the various areas of electrical machines Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert electrical engineer Electrical Machines Online Course for Electrical Engineers - Bundle Course Master the skills you need to propel your career forward in electrical machines. This course will equip you with the essential knowledge and skillset that will make you a confident electrical engineer and take your career to the next level. This comprehensive electrical machines course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this electrical machines course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective electrical machines practice and equip you with the essential skills, confidence and competence to assist you in the electrical machines industry. You'll gain a solid understanding of the core competencies required to drive a successful career in electrical machines. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for electrical engineer or for people who are aspiring to specialise in electrical machines. Enrol in this electrical machines course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive electrical machines course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this electrical machines can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This electrical machines course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This electrical machines course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This electrical machines course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Content Introduction to Electric Machines 00:03:00 Types of Electric Machines and Principle of Electricity Generation 00:09:00 DC Machines Importance and Construction of DC Machines 00:26:00 Armature Winding and EMF Equation 00:39:00 Solved Example 1 00:04:00 Solved Example 2 00:03:00 Solved Example 3 00:07:00 Solved Example 4 00:06:00 Separately Excited DC Machine 00:20:00 Shunt and Series DC Machines 00:25:00 Solved Example 1 on Separately Excited DC Machine 00:07:00 Solved Example 2 on Separately Excited DC Machine 00:07:00 Solved Example 3 on Shunt Generator 00:04:00 Solved Example 4 on Shunt Generator 00:06:00 Solved Example 5 on Series DC Generator 00:06:00 Types and Applications of Compound DC Motors 00:07:00 Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor 00:33:00 Torque-Speed Characteristics of Series DC Motor 00:08:00 Solved Example 1 on Speed Control 00:08:00 Solved Example 2 on Speed Control 00:05:00 Starting of DC Machine 00:13:00 Armature Reaction in DC Machines 00:10:00 Losses in DC Machines 00:03:00 Construction of Transformer What is The Construction of Transformer, Importance and Iron Core 00:02:00 Magnetic Circuit Inside Transformer 00:04:00 Windings of Transformer 00:03:00 Why are Windings Made of Copper 00:01:00 Classification of Windings 00:04:00 Insulating Material and Transformer Oil 00:02:00 Conservator of Transformer 00:02:00 Breather of Transformer 00:03:00 Bushings of Transformer 00:04:00 Tap Changer of Transformer 00:03:00 Cooling Tubes of Transformer 00:01:00 Buchholz Relay of Transformer 00:02:00 Explosion Vent In Transformer 00:02:00 Methods of Cooling In Transformer 00:02:00 Types of Transformers 00:02:00 Power Transformer and Distribution Transformer 00:05:00 Single Phase Core Type Transformer 00:04:00 Single Phase Shell Type Transformer 00:04:00 Three Phase Core Type Transformer 00:01:00 Three Phase Shell Type Transformer 00:01:00 Comparison between Shell and Core CSA 00:01:00 Comparison between Shell and Core Type 00:01:00 Notes 00:03:00 Video Explaining The Components in 3D and Real Life 00:04:00 Fundamentals of Magnetic Circuits for Electrical Engineering Introduction to Magnetic Circuits 00:02:00 Induced Emf and Current 00:04:00 Ampere Right Hand Rule 00:04:00 Magnetic Circuit and Important Definitions 00:06:00 Linear and Non Linear Materials 00:02:00 Flux Linkage and Reluctance 00:03:00 Analogy between Electric and Magnetic Circuits 00:05:00 Fringing Effect 00:01:00 Example 1 Magnetic Circuits 00:06:00 Example 2 00:02:00 Example 3 00:05:00 Application on Magnetic Circuit - Transformers 00:03:00 Theoretical Part on Transformers Introduction to Transformers 00:02:00 Construction of Transformer 00:01:00 Theory of Operation 00:04:00 Ideal Transformer 00:04:00 Non Ideal Transformer 00:02:00 Effect of Loading on Transformer 00:03:00 Transformer Regulation 00:02:00 Transformer Losses 00:03:00 Transformer Efficiency 00:04:00 Transformer Rating 00:01:00 Question 1 00:01:00 Question 2 00:01:00 Question 3 00:01:00 Example 1 00:01:00 Voltage Relation of Transformer 00:04:00 Transformer Exact Equivalent Circuit 00:06:00 Concept of Refereeing 00:04:00 Approximate Equivalent Circuit 00:02:00 Synchronous Machines Construction and Principle of Operation of Synchronous Generator 00:29:00 Principle of Operation of Synchronous Motor 00:24:00 Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine 00:29:00 Solved Example 1 on Non Salient Machine 00:04:00 Solved Example 2 on Non Salient Machine 00:10:00 Solved Example 3 on Non Salient Machine 00:07:00 Solved Example 4 on Non Salient Machine 00:04:00 Solved Example 5 on Non Salient Machine 00:07:00 Solved Example 6 on Non Salient Machine 00:03:00 Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine 00:38:00 Solved Example 1 on Salient Machine 00:09:00 Solved Example 2 on Salient Machine 00:05:00 Solved Example 3 on Salient Machine 00:09:00 Parallel Operation of Two Generators 00:17:00 Synchronization of Machine with Grid 00:10:00 Induction Machines Construction and Theory of Operation of Induction Machines 00:27:00 Equivalent Circuit and Power Flow in Induction Motor 00:23:00 Torque-Speed Characteristics of Induction Motor 00:19:00 Solved Example 1 on Induction Motor 00:07:00 Solved Example 2 on Induction Motor 00:06:00 Solved Example 3 on Induction Motor 00:06:00 Solved Example 4 on Induction Motor 00:18:00 Solved Example 5 on Induction Motor 00:13:00 Methods of Speed Control of Induction Motor 00:27:00 Methods of Starting of Induction Motor 00:21:00 Solved Example on Motor Starter 00:14:00 Principle of Operation of Doubly Fed Induction Generator 00:11:00 Self Excited Induction Generator 00:08:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Electrical Machines Online Course for Electrical Engineers - Bundle
Delivered Online On Demand
£19

Ethical Hacking

4.7(160)

By Janets

Register on the Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Introduction Course Overview 00:04:00 Module 02: Virtual Lab Environment Create a Virtual Install of Kali Linux Using VirtualBox 00:11:00 Module 03: EVM: 1 Lab preparation 00:03:00 Scanning and Enumeration 00:15:00 Exploitation and Privilege Escalation 00:10:00 Module 04: INFOSEC: Prep OSCP Lab file 01:15:00 Video - Lab Setup 00:04:00 Video - Walkthrough - CTF INFOSEC: Prep OSCP 00:18:00 Module 05: CTF - SQL Injection to Shell Walkthrough Lab Preparation 00:05:00 CTF Walkthrough - SQL Injection to Shell 00:13:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Ethical Hacking
Delivered Online On Demand2 hours 38 minutes
£25
1...678910...28