Learn Python Programming using a Step By Step Approach with 200+ code examples.
Who is this course for? Landmark Training Course With Vectorworks. Dive into terrain modeling, planting, irrigation, and site analysis guided by certified tutors. Master these tools for precise landscape designs and effective documentation. Check our Website Enrollment : 1-on-1 Landmark Training. Tailor your schedule. Mon to Sat between 9 am and 7 pm Call 02077202581 to book your slot. Duration: 16 hours. "Split these hours over multiple days as needed for your ideal schedule." Approach: In-person or live online. Landmark Training Course with Vectorworks: Basic to Intermediate Level Course Duration: 16 Hours Embark on a transformative journey with our Landmark Training Course tailored for landscape architects and designers. Over 16 intensive hours, dive deep into Vectorworks Landmark, mastering fundamental and intermediate techniques crucial for comprehensive 2D and 3D landscape design. Craft intricate site analyses, plans, irrigation systems, and elevate your designs with mesmerizing 3D visualizations. Explore custom plant symbols, detailed planting plans, and learn the art of efficient collaboration and customization. Course Highlights: I. Introduction to Vectorworks Landmark (1 hour) Explore Vectorworks Landmark for landscape design Master interface, tool usage, and project management II. Site Analysis and Site Plans (3 hours) Craft detailed site analyses and hardscape designs Work with contours, elevations, and terrain models III. Planting Plans (5 hours) Utilize the plant database for region-specific plant selection Create personalized plant symbols and comprehensive planting plans IV. Irrigation Design (2 hours) Design and edit efficient irrigation systems and zones Integrate irrigation components into site plans V. 3D Visualization (3 hours) Create captivating 3D models with realistic textures and materials Enhance designs with advanced lighting and special effects VI. Customization (1 hour) Tailor the interface for efficient landscape design Create custom object styles and resource libraries VII. Collaboration and Sharing (1 hour) Seamlessly import/export data from other platforms Share designs effectively with colleagues and collaborators VIII. Conclusion and Next Steps (1 hour) Review course content comprehensively Receive guidance on further learning resources Engage in a Q&A session and provide valuable feedback Enhance your landscape design expertise and unleash your creativity. Enroll now in our Vectorworks Landmark Basic to Intermediate Training and transform your designs. Download Vectorworks Landmark By the end of the Vectorworks Landmark Training Course, participants will: Understand the key features and functionalities of Vectorworks Landmark for landscape design. Demonstrate proficiency in using essential tools for site analysis, site plans, and hardscape design. Create detailed planting plans, selecting appropriate plants, and understanding their compatibility and growth patterns. Design efficient and effective irrigation systems, including generating irrigation reports. Create 3D visualizations of landscape designs, applying textures, materials, lighting, and special effects. Customize the interface and create personalized object styles and resources. Collaborate and share landscape design drawings with other software users. Have the foundation to pursue further learning and exploration in landscape design using Vectorworks Landmark. Mastering Foundations Begin your project by organizing your files and importing survey data. Learn to sketch existing buildings using Building Shell tools and model neighboring structures with Massing Model. Explore different methods for laying out survey points and marking existing features with precision. Objectives: Review File Organization Techniques Import Survey Data (DWG Import) Create Building Structures with Building Shell Tools Utilize Triangulation and Arc Tool for Precision Master Various Tape Measurement Techniques Elevating Your Design Enhance your survey with detailed ground, existing trees, and fences. Conduct shadow analysis to optimize planting locations. Dive into the Vectorworks Plant tool, your key design companion. Objectives: Develop Detailed Ground Surfaces Incorporate Existing Trees and Fences Design with Railing Fence Tool Conduct Shadow Analysis using Heliodon Tool Utilize Plant Tool Modes for Plant Placement Access Existing Plant Libraries and Customize Plants in 2D/3D Crafting Landscapes Create vibrant plant mixes using Landscape Area tool and apply them across your site models. Design intricate hardscapes, aligning them effortlessly even in complex paving scenarios. Learn to use components for detailed reporting, cut and fill calculations, and precise detailing. Explore custom object creation and site furniture placement. Objectives: Design Landscape Areas and Define Custom Plant Mixes Create Hardscapes and Define Custom Paving Constructions Generate Reports and Tags for Landscape Areas and Hardscapes Access and Manage Objects in Resource Manager Craft Custom Objects and Site Furniture Polished Presentation Present your designs professionally using Sheet layers and viewports. Create Section viewports to cut through your model and Detail viewports to focus on specific areas. Enhance visual appeal with mood boards and annotations, ensuring a refined, detailed presentation. Objectives: Craft Sheet Layers for Presentation Create Plan, Elevation, and Perspective Viewports Generate Section and Detail Viewports Annotate Viewports for Clear Communication Incorporate Images and Plant Reports for Comprehensive Presentations Master Vectorworks Landmark: Gain expertise in essential and advanced 2D/3D landscape design tools for precision and efficiency. Boost Efficiency: Learn time-saving techniques and workflows tailored to Vectorworks Landmark, enhancing productivity. Versatile Landscape Skills: Develop proficiency in site analysis, planting plans, hardscapes, and irrigation systems for diverse projects. Industry-Ready Expertise: Acquire sought-after skills in landscape architecture, paving the way for career growth. Flexible Learning: Access recorded lessons for convenient review and receive lifetime email support for ongoing guidance.
Start your career as an ENTRY LEVEL-Software Developer and earn upto £25,000/ Month Looking to step into the fast-paced world of IT support? In the UK alone, IT job postings surged by a whopping 55% in 2022, evidencing the thriving demand for IT professionals. In such a dynamic job market, our Software Development online course serves as your launchpad, opening doors to myriad opportunities. Be it your first step into the IT realm or an upgrade to your current skills, we offer unparalleled support, ensuring you're career-ready by the time you complete our Software Development Training. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Software Developers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Software Development Training Program today and start your journey to becoming a successful Software Developer! If you have any questions, you can contact us. We will be happy to provide you with all the information you need. Why Choose Our Software Development Job Ready Program? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Software Development Training: One-On-One Consultation Sessions with Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Software Development field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Software Developers. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Continuous Career Support: Our commitment doesn't end when you secure a job. We'll be there for you throughout your career journey, offering continued support and guidance. Whether you need advice on career advancement, assistance with new projects, or simply a friendly ear to share your achievements, we'll be your trusted partner for long-term success. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 14-day money-back guarantee. Here are the courses we will provide once you enrol in the Software Development program: Course 01: Microsoft Azure Cloud Concepts Course 02: Google Cloud for Beginners Course 03: Azure Administrator Essentials Course 04: AWS Certified Database Specialty Exam Preparation (DBS-C01) Course 05: Easy to Advanced Data Structures Course 06: Graph Theory Algorithms Course 07: Linux Security and Hardening Course 08: Linux Shell Scripting Course 09: Bash Scripting, Linux and Shell Programming Course 10: C Programming on Linux Course 11: Coding Essentials - Javascript, ASP. Net, C# - Bonus HTML Course 12: JavaScript Advanced Training Course 13: Hands-On JavaScript Project - Bank Customer Page Course 14: JavaScript Project Development - Creating Web Apps Course 15: How To Startup Your Own SaaS (Software As a Service) Company (SaaS Evolution) Course 16: Web Application Penetration Testing Course Course 17: CSS - Responsive Design How Can We Offer Software Development Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. Software Development Career Track The Software Development Training Program is completed in 9 easy steps: Step 1: Enrol in the Software Development Programme Begin your exciting journey with us by enrolling in the Software Development Training program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 17 premium courses related to Software Development. These Software Development courses will teach you the knowledge and skills required to become a successful Software Developer. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled in the Software Development Course, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the Software Development Course Bundle, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the IT industry. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills in Software Development to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in software development, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. Enrol today, and let's get started! Your path to a successful career in software development begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Software Development Career Track This Software Development Training program is ideal for: Aspiring IT Helpdesk Support seeking comprehensive training and industry-specific career guidance. Individuals looking to transition into a tech-based role and require personalised mentorship. Graduates wanting to enhance their employability with tailored CV building and interview preparation. Tech enthusiasts desiring to leverage industry connections for job opportunities in software development. Software Development Requirements Software Development Career Track No experience is required to enrol on Software Development Training. Just enrol in Software Development training & start learning. Enrol today, and let's get started! Your path to a successful career in software development begins with us. Career path Software Development Career Track Upon completing our Software Development program, you will be prepared to seek various positions in software development across the UK, such as software engineer, web developer, mobile app developer, database administrator, software tester, or software project manager and much more. Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included
About this VILT Tripod can be used in any area of business where the organisation has a management system in place to prevent unwanted events e.g., health, safety, environment, quality, security, productivity, project management, and many more Tripod Beta is one of several tools based on Tripod's fundamental principles. Tripod Beta is based on proven theories, man years of academic research, and testing in the workplace. The Swiss Cheese Model originated from this work. Features of the methodology are: 1) the Tripod Beta diagram; it provides an easy-to-read summary of the entire investigation on a single page, 2) it accommodates deficiencies in leadership and worker participation, 3) it accommodates deficiencies in human behaviour, and 4) it highlights missing controls (not just controls that failed). Quality throughout all aspects of Tripod is assured by the Stichting Tripod Foundation (STF) and the Energy Institute. The participants will gain a theoretical understanding of the Tripod Beta methodology and terminology. They will be able to read Tripod diagrams and reports, and be able to assist incident investigation/analysis as a team member. This is the first step to becoming an accredited silver or gold practitioner. Tripod Beta Practitioner Accreditation is meant to build these skills, through a blend of support, coaching and assessments. Feedback is provided on Tripod incident investigation reports, giving the Practitioner the opportunity to hone their skills and become confident in their ability to use Tripod effectively. Training Objectives Upon completion of this course, participants will be able to: Pass the Tripod Beta Practitioner (Bronze Level) exam Act as a team member or Tripod facilitator on an incident investigation Plan and schedule activities for an incident investigation Focus line of enquiry during an investigation Engage with the most relevant people at each stage of the investigation Describe the incident causation paths in terms that align with their management system Consider issues relating to leadership, worker participation and human behaviour Assess the quality of an incident report Apply the process to any type of unwanted event that should have been prevented by a management system e.g., health, safety, environment, financial, security, productivity, quality, project management etc. Combine the findings from many incidents with data from other initiatives e.g., audits and inspections, to spot trends to prioritise actions and product a single improvement plan Target Audience The course is recommended for anyone who is expected to play a role in designing, reviewing, auditing, and following your organizations OH&S management system. Successful participants will be awarded the Stitching Tripod Foundation Tripod Beta Bronze certificate. The following oil & gas company personnel will benefit from the knowledge shared in this course: CEO Team Leaders Legal, insurance and finance departments Managers (Line and Function) Maintenance Engineers Quality Assurance Engineers Process Engineers Incident Investigators (Team member & Tripod facilitator) Project Managers System Custodians Technical Authorities Key Contractor's Management Contract Managers/Holders Safety Representatives Risk Management Engineers HSE Advisors Supervisors Auditors Regulators Course Level Basic or Foundation Trainer Your expert course leader has over 30 years of experience in construction, operations and maintenance with the upstream exploration and production sector. He joined Shell International E&P in 1971 and for 28 years worked in several locations around the world. Following the Piper Alpha incident he led Shell's two year, £10M major overhaul of their permit to work system. He first made use of the Tripod Beta principles during this period and since then he has delivered over 100 Tripod Beta courses in more than 25 locations around the world. He is a Chartered Engineer, a member of the Institution of Engineering and Technology and holds a postgraduate diploma from the University of Birmingham (UK). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of common vSphere log files Identify networking issues based on reported symptoms Validate and troubleshoot the reported networking issue Identify the root cause of networking issue Implement the appropriate resolution to recover from networking problems Analyze storage failure scenarios using a logical troubleshooting methodology identify the root cause of storage failure Apply the appropriate resolution to resolve storage failure problems Troubleshoot vSphere cluster failure scenarios Analyze possible vSphere cluster failure causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXiTM host and VMware vCenter problems Analyze failure scenarios of ESXi host and vCenter problems Select the correct resolution for the failure of ESXi host and vCenter problems Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems. Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Discuss the various methods to run commands Discuss the various ways to access ESXi Shell Use commands to view, configure, and manage your vSphere components Use the vSphere CLI Use ESXCLI commands from the vSphere CLI Use Data Center CLI commands Identify the best tool for command-line interface troubleshooting Identify important log files for troubleshooting vCenter Server and ESXi Describe the benefits and capabilities of VMware SkylineTM Explain how VMware Skyline works Describe VMware SkylineTM Health Describe VMware Skyline AdvisorTM Troubleshooting Virtual Networking Analyze and troubleshoot standard switch problems Analyze and troubleshoot virtual machine connectivity problems Analyze and troubleshoot management network problems Analyze and troubleshoot distributed switch problems Troubleshooting Storage Discuss the vSphere storage architecture Identify the possible causes of problems in the various types of datastores Analyze the common storage connectivity and configuration problems Discuss the possible storage problems causes Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility Review vSphere storage architecture and functionality necessary to troubleshoot storage problems Use ESXi and Linux commands to troubleshoot storage problems Analyze log file entries to identify the root cause of storage problems Investigate ESXi storage issues Troubleshoot VM snapshots Troubleshoot storage performance problems Review multipathing Identify the common causes of missing paths, including PDL and APD conditions Solve the missing path problems between hosts and storage devices Troubleshooting vSphere Clusters Identify and troubleshoot vSphere HA problems Analyze and solve vSphere vMotion problems Diagnose and troubleshoot common vSphere DRS problems Troubleshooting Virtual Machines Discuss virtual machine files and disk content IDs Identify, analyze, and solve virtual machine snapshot problems Troubleshoot virtual machine power-on problems Identify possible causes and troubleshoot virtual machine connection state problems Diagnose and recover from VMware Tools installation failures Troubleshooting vCenter Server and ESXi Analyze and solve vCenter Server service problems Diagnose and troubleshoot vCenter Server database problems Use vCenter Server Appliance shell and the Bash shell to identify and solve problems Identify and troubleshoot ESXi host problems
About this Training Course This 5 full-day course will focus on geological fundamentals: how different basin types differ in subsidence mechanisms, basin cycles, heat flow through time, depositional systems, structural styles and their type of petroleum systems. This will allow participants to make realistic interpretations in new areas; interpretations that are consistent with the specific basin type and to be expected depositional systems and structural styles. In addition, through simple paper-based exercises, the course will provide background and understanding of how some of the typical PBE products are made: creaming curves, Field-size plots and Yet-to-find. Finally, the essentials of commercial assessments will be covered. Training Objectives To provide participants with a sound understanding how, and under which conditions different basin types develop, and what the impact of their development is on the typical petroleum systems of these different basin types. To teach evaluation techniques that assist in the regional understanding and illustration of sedimentary basins and their development. While some of these techniques can be done using computers, in the course these will be done 'by hand' for maximum understanding. Target Audience This course is designed in the first place for geoscientists working in exploration and their direct supervisors. The course is also very instructive for specialist staff working closely with exploration staff such as (bio)stratigraphers, geochemists, basin modelers, structural geologists, geophysicists, reservoir engineers and petrophysicists. Course Level Intermediate Training Methods Each topic is introduced by a lecture, and leaning is re-enforced by practical exercises (on paper). There is ample time for discussions of general issues and any specific questions participants may have. For several exercises participants will be invited to do exercises on a basin of their choice, which will make the course more impactful for the participants. Participants will be provided with the following pre-read material: Concepts of Conventional Petroleum Systems. De Jager, J. (2020). Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N. Play-Based Exploration of the petroleum potential of the Tremp-Graus, Ainsa and eastern Jaca Sub-basins in the southern De Jager, J & van Winden, M. (2020). invited contribution for Digital Learning - Multi-scale analysis of depositional systems and their subsurface workflows (eds: Grötsch, J. & Pöppelreiter, M.), EAGE. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, AÃnsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Overview This comprehensive course on Electrical Machines for Electrical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Electrical Machines for Electrical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Electrical Machines for Electrical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Electrical Machines for Electrical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 8 sections • 108 lectures • 14:20:00 total length •Module 1- Introduction to Electric Machines: 00:03:00 •Module 2- Types of Electric Machines and Principle of Electrical Generation: 00:09:00 •Module 1- Importance and Construction of DC Machines: 00:26:00 •Module 2- Armature Winding and EMF Equation: 00:40:00 •Module 3-Solved Example 1: 00:05:00 •Module 4-Solved Example 2: 00:04:00 •Module 5-Solved Example 3: 00:07:00 •Module 6-Solved Example 4: 00:06:00 •Module 7-Separately Excited DC Machine: 00:21:00 •Module 8-Shunt and Series DC Machines: 00:25:00 •Module 9-Solved Example 1 on Separately Excited DC Machine: 00:07:00 •Module 10-Solved Example 2 on Separately Excited DC Machine: 00:07:00 •Module 11-Solved Example 3 on Shunt Generator: 00:04:00 •Module 12-Solved Example 4 on Shunt Generator: 00:07:00 •Module 13-Solved Example 5 on Series DC Generator: 00:06:00 •Module 14-Types and Applications of Compound DC Motors: 00:07:00 •Module 15- Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor: 00:33:00 •Module 16- Torque-Speed Characteristics of Series DC Motor: 00:08:00 •Module 17-Solved Example 1 on Speed Control: 00:08:00 •Module 18-Solved Example 2 on Speed Control: 00:06:00 •Module 19- Starting of DC Machine: 00:14:00 •Module 20- Armature Reaction in DC Machines: 00:10:00 •Module 21-Losses in DC Machines: 00:04:00 •Module 1- What is a Transformer: 00:02:00 •Module 2- Importance of Transformer: 00:04:00 •Module 3-Iron Core of Transformer: 00:04:00 •Module 4- Magnetic Circuit Inside Transformer: 00:05:00 •Module 5- Windings of Transformer: 00:03:00 •Module 6- Why are Windings Made of Copper: 00:01:00 •Module 7- Classification of Windings: 00:05:00 •Module 8- Insulating Material and Transformer Oil: 00:02:00 •Module 9- Conservator of Transformer: 00:03:00 •Module 10- Breather of Transformer: 00:04:00 •Module 11- Bushings of Transformer: 00:04:00 •Module 12- Tap Changer of Transformer: 00:03:00 •Module 13- Cooling Tubes of Transformer: 00:01:00 •Module 14- Buchholz Relay of Transformer: 00:02:00 •Module 15- Explosion Vent: 00:02:00 •Module 16- Methods of Cooling: 00:03:00 •Module 17-Types of Transformers: 00:03:00 •Module 18- Power Transformer and Distribution Transformer: 00:05:00 •Module 19- Single Phase Core Type Transformer: 00:04:00 •Module 20-Single Phase Shell Type Transformer: 00:05:00 •Module 21- 3 Phase Core Type: 00:02:00 •Module 22- 3 Phase Shell Type: 00:01:00 •Module 23- Comparison between Shell and Core CSA: 00:01:00 •Module 24- Comparison between Shell and Core Type: 00:01:00 •Module 25- Notes: 00:03:00 •Module 26-Video Explaining The Components in 3D and Real Life: 00:05:00 •Module 1- Introduction to Magnetic Circuits: 00:02:00 •Module 2- Induced Emf and Current: 00:04:00 •Module 3- Ampere Right Hand Rule: 00:04:00 •Module 4- Magnetic Circuit and Important Definitions: 00:06:00 •Module 5- Linear and Non Linear Materials: 00:03:00 •Module 6-Flux Linkage and Reluctance: 00:04:00 •Module 7- Analogy between Electric and Magnetic Circuits: 00:06:00 •Module 8- Fringing Effect: 00:02:00 •Module 9- Example 1 Magnetic Circuits: 00:07:00 •Module 10- Example 2: 00:03:00 •Module 11- Example 3: 00:06:00 •Module 12- Application on Magnetic Circuit - Transformers: 00:04:00 •Module 1- Introduction to Transformers: 00:02:00 •Module 2- Construction of Transformer: 00:02:00 •Module 3-Theory of Operation: 00:04:00 •Module 4- Ideal Transformer: 00:05:00 •Module 5-Non Ideal Transformer: 00:02:00 •Module 6- Effect of Loading on Transformer: 00:03:00 •Module 7- Transformer Regulation: 00:03:00 •Module 8- Transformer Losses: 00:03:00 •Module 9- Transformer Efficiency: 00:05:00 •Module 10- Transformer Rating: 00:02:00 •Module 11- Question 1: 00:01:00 •Module 12- Question 2: 00:02:00 •Module 13- Question 3: 00:01:00 •Module 14- Example 1: 00:01:00 •Module 15- Voltage Relation of Transformer: 00:04:00 •Module 16- Transformer Exact Equivalent Circuit: 00:06:00 •Module 17- Concept of Refereeing: 00:04:00 •Module 18- Approximate Equivalent Circuit: 00:02:00 •Module 1- Construction and Principle of Operation of Synchronous Generator: 00:29:00 •Module 2- Principle of Operation of Synchronous Motor: 00:24:00 •Module 3- Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine: 00:29:00 •Module 4-Solved Example 1 on Non Salient Machine: 00:05:00 •Module 5-Solved Example 2 on Non Salient Machine: 00:11:00 •Module 6-Solved Example 3 on Non Salient Machine: 00:07:00 •Module 7- Solved Example 4 on Non Salient Machine: 00:04:00 •Module 8-Solved Example 5 on Non Salient Machine: 00:07:00 •Module 9-Solved Example 6 on Non Salient Machine: 00:03:00 •Module 10- Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine: 00:39:00 •Module 11-Solved Example 1 on Salient Machine: 00:09:00 •Module 12- Solved Example 2 on Salient Machine: 00:05:00 •Module 13-Solved Example 3 on Salient Machine: 00:10:00 •Module 14- Parallel Operation of Two Generators: 00:17:00 •Module 15- Synchronization of Machine with Grid: 00:10:00 •Module 1- Construction and Theory of Operation of Induction Machines: 00:27:00 •Module 2- Equivalent Circuit and Power Flow in Induction Motor: 00:23:00 •Module 3- Torque-Speed Characteristics of Induction Motor: 00:20:00 •Module 4- Solved Example 1 on Induction Motor: 00:08:00 •Module 5-Solved Example 2 on Induction Motor: 00:06:00 •Module 6-Solved Example 3 on Induction Motor: 00:06:00 •Module 7-Solved Example 4 on Induction Motor: 00:18:00 •Module 8-Solved Example 5 on Induction Motor: 00:13:00 •Module 9- Methods of Speed Control of Induction Motor: 00:27:00 •Module 10- Methods of Starting of Induction Motor: 00:21:00 •Module 11-Solved Example on Motor Starter: 00:15:00 •Module 12- Principle of Operation of Doubly Fed Induction Generator: 00:11:00 •Module 13-Self Excited Induction Generator: 00:08:00 •Assignment - Electrical Machines for Electrical Engineering: 00:00:00
Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00
Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Defend, Excel, Succeed: Unleash Your Potential with IT: CompTIA with Cyber Security program. Dive into IT excellence and cyber resilience with our exclusive IT: CompTIA with Cyber Security program. Elevate your career prospects and knowledge with our comprehensive curriculum to pave the way for success. Our IT: CompTIA with Cyber Security program is a stepping stone, guiding you toward a fulfilling career. With technology shaping industries, the demand for skilled professionals is at an all-time high. This program, spanning multiple courses, is tailored to equip you with the expertise employers demand across diverse sectors. Delve into cutting-edge subjects such as CompTIA A+, Cloud Computing, Cybersecurity Analyst, PenTest+, and more. Moreover, we're your dedicated partners in this exciting IT: CompTIA with Cyber Security program. Our goal isn't just to teach you; it's to support you 24/7 so you can get closer to your dream job. We're so confident with our program that we offer a 100% money-back guarantee, ensuring your complete satisfaction. Learning Outcomes: By completing this IT: CompTIA with Cyber Security program, you will gain the following: Master CompTIA A+ essentials (220-1001 and 220-1002). Understand Cloud Computing principles (CompTIA Cloud+). Analyse and counteract cybersecurity threats (CompTIA CySA+). Conduct ethical hacking with CompTIA PenTest+. Attain a robust grasp of IT fundamentals and networking. Excel in Linux systems and Bash scripting. Develop skills in incident handling and response. Cultivate cyber awareness through online courses Explore Linux & ethical hacking using Kali Linux Master Bash scripting, Linux, and shell programming Become a skilled IT support technician Progress to network security level 2 & functional IT skills Craft a compelling CV and master job searching Ace interviews with expert guidance Navigate video job interviews effectively Create a standout LinkedIn profile Courses Included in the Program Enrol in our IT: CompTIA with Cyber Security program and gain access to a 25 comprehensive set of courses, including: => Course 01: CompTIA A+ (220-1001) => Course 02: CompTIA A+ (220-1002) => Course 03: Cloud Computing / CompTIA Cloud+ (CV0-002) => Course 04: CompTIA CySA+ Cybersecurity Analyst (CS0-002) => Course 05: CompTIA PenTest+ (Ethical Hacking) => Course 06: CompTIA Security+ (SY0-601) => Course 07: CompTIA IT Fundamentals ITF+ (FCO-U61) => Course 08: CompTIA Networking - Level 4 => Course 09: CompTIA Healthcare IT Technician => Course 10: Cyber Security Incident Handling and Incident Response => Course 11: Cyber Security Advanced Training => Course 12: Cyber Security Awareness Training | Online Course => Course 13: Learn Linux in 5 Days => Course 14: Ethical Hacking with Kali Linux => Course 15: Bash Scripting, Linux and Shell Programming => Course 16: IT Support Technician Training => Course 17: Network Security Level 2 => Course 18: Functional Skills IT => Course 19: Data Protection and Data Security Level 2 => Course 20: Learning Computers and Internet Level 2 => Course 21: Career Development Plan Fundamentals => Course 22: CV Writing and Job Searching => Course 23: Interview Skills: Ace the Interview => Course 24: Video Job Interview for Job Seekers => Course 25: How to Create a Professional LinkedIn Profile Enrol in our highly regarded IT: CompTIA with Cyber Security program, featuring a job-relevant curriculum that ensures your skills align with employer expectations across various sectors. Don't miss this opportunity - your success story starts now! For any query, please feel free to contact us, and we will be glad to assist you. Venture on a transformative journey through our IT: CompTIA with Cyber Security program, meticulously crafted to empower you with cutting-edge IT skills and cybersecurity expertise. Elevate your career prospects with a curriculum designed to meet industry demands, providing a comprehensive understanding of the IT landscape. Why Choose Us? What sets us apart is our unwavering commitment to your success. Here's what you gain by joining our IT: CompTIA with Cyber Security program: Updated Materials: Stay current with industry trends: Our IT: CompTIA with Cyber Security program ensures you have access to the most up-to-date materials, guaranteeing a curriculum that reflects the latest technological advancements. Dive into the cutting-edge knowledge that empowers you to navigate the dynamic IT terrain confidently, equipping you for success in the fast-paced world of information technology. Flexible Timing: Learn at your own pace:Life can be unpredictable, but your learning journey doesn't have to be. Flexibility is critical with our IT: CompTIA with Cyber Security program. Learn at your own pace, whether you're a full-time professional, a student, or someone managing various commitments. Our program adapts to your schedule, allowing you to delve into the intricacies of IT and cyber security without compromising your existing responsibilities. No Hidden Cost: Certification and course materials are inclusive. Transparency is the cornerstone of our IT: CompTIA with Cyber Security program. We believe in providing a seamless learning experience without any financial surprises. Your enrollment covers the comprehensive certification process and all necessary course materials. Say goodbye to hidden costs and embrace a straightforward, all-inclusive educational journey. Money-Back Guarantee: Enjoy peace of mind within 14 days: With our IT: CompTIA with Cyber Security program, your peace of mind is our priority. Take the first two weeks to explore the curriculum and experience the quality of our offerings. If, for any reason, you feel this program isn't the right fit for you, enjoy the reassurance of our 100% money-back guarantee within 14 days of enrollment. Lifetime Access: Continued learning at your fingertips:Our commitment to your growth extends beyond completing the program. Enrol in IT: CompTIA with Cyber Security and gain lifetime access to course materials and updates. Keep your knowledge current, revisit critical concepts, and stay connected to the ever-evolving world of IT. Your journey doesn't end; it evolves with you. 24/7 Support: Assistance whenever you need it:Our IT: CompTIA with Cyber Security program provides 24/7 support, ensuring that assistance is readily available whenever you need it. Whether you have questions about the curriculum, encounter technical issues, or seek guidance on your learning path, our dedicated support team is just a message away, ready to provide the help you need. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT: CompTIA with Cyber Security program is for individuals who are: Aspiring IT professionals. Seeking to specialise in cybersecurity. Eager to enhance networking skills. Wishing to enter the healthcare IT sector. Interested in ethical hacking and penetration testing. Requirements No prior experience is required to enrol in IT: CompTIA with Cyber Security program. Career path Upon completion of IT: CompTIA with Cyber Security program, explore a multitude of career paths, including: Cybersecurity Analyst: £30,000 - £50,000 IT Support Technician: £25,000 - £40,000 Cloud Computing Specialist: £35,000 - £55,000 Network Security Specialist: £30,000 - £50,000 Healthcare IT Technician: £28,000 - £45,000 Linux Systems Administrator: £35,000 - £60,000 Certificates CPD Accredited (e-Certificate) Digital certificate - Included CPD Accredited (Hard Copy Certificate) Hard copy certificate - Included e-Transcript Digital certificate - Included Hard Copy Transcript Hard copy certificate - Included Student ID Card Digital certificate - Included