• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2990 Software Development courses delivered Online

Fundamentals of Secure Software

By Packt

This course is complete training for someone who wants to join the security world and get familiar with most of the practices/risks and different areas, where they can invest to become experts. It covers both the 'admin' side of how to develop the processes and program around it as well as an insight into the technical aspects.

Fundamentals of Secure Software
Delivered Online On Demand6 hours 33 minutes
£74.99

React JS Masterclass - Go From Zero To Job Ready

By Packt

This course offers everything you need to become a React developer, from basic to advanced concepts. The course delves deep into custom hooks, Tailwind CSS, React Router, Redux, Firebase, and React Skeleton. You will learn to build real-world apps with React (eCommerce, Movie Informer, Todolist Manager, Blog, and Word Counter).

React JS Masterclass - Go From Zero To Job Ready
Delivered Online On Demand34 hours 49 minutes
£82.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Blender Character Creator for Video Games Design

4.9(27)

By Apex Learning

Prepare for a career in the high-growth field of IT, no experience or degree is required! With more businesses shifting online, the demand for tech professionals is at an all-time high in the UK. Software Developers, Project managers, Cybersecurity analysts, Cloud architects, and Data analysts are just a few of them. Tech giants like Google, Amazon, Meta, Apple, and Microsoft always welcome skilled IT professionals. The salary ranges vary with skill and experience, with an average of £50K in relevant sectors. And the best thing is if you are good enough, you can even work from home. So enrol in this Blender Character Creator for Video Games Design course to start your journey to success now! Along with this Blender Character Creator for Video Games Design course, you will get 19 Premium courses, an originalHardcopy, 20 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Blender Character Creator for Video Games Design Bundle Consists of the following Premium courses: Course 01: Blender 3D - Create a Cartoon Character Course 02: Make Cinematics Using Unreal Engine 5 Course 03: Create a Game With Gamemaker Studio 2 Course 04: Modern OpenGL 3D Game Course 05: Maya & Unity 3D: Modeling Environments for Mobile Games Course 06: JavaScript Project - Game Development with JS Course 07: Game Development using Cocos2d-x v3 C++ Course 08: Tic-Tac-Toe Clone - The Complete Cocos2d-x C++ Game Course Course 09: Tic-Tac-Toe Clone - The Complete SFML C++ Game Course Course 10: Unreal Engine 4 Course 11: Design 2D Game Characters With Inkscape Course 12: Develop 2D Game UI Using Inkscape Course 13: Video Game Design Course Course 14: Publish Game Assets to the Unity & Unreal Marketplace for Passive Income Course 15: Basic C# Coding Course 16: Modular Game Art Creation With Inkscape Course 17: HTML and CSS Coding: Beginner to Advanced Course 18: Python Programming for Everybody Course 19: Drawing Cartoon Humans Course 20: Draw Cartoon Characters The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Blender Character Creator for Video Games Design expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Course Curriculum: Course 01: Blender 3D - Create a Cartoon Character Section 01: Introduction Section 02: Creating the Character Certificate: PDF Certificate: Free (Previously it was £6*20= £120) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 215 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Blender Character Creator for Video Games Design bundle. Requirements This Blender Character Creator for Video Games Design course has been designed to be fully compatible with tablets and smartphones. Career path Having this expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Blender 3D - Create a Cartoon Character) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Blender Character Creator for Video Games Design
Delivered Online On Demand
£100

INTERNATIONAL MARKETING- AI & SOCIAL MEDIA

By Export Unlocked Limited

This module aims to develop knowledge from research activities to gain an understanding of international trade using Marketing , Social Media and how AI plays a role in International Marketing

INTERNATIONAL MARKETING- AI & SOCIAL MEDIA
Delivered Online
£395

IT for Recruiters

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special IT for Recruiters Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The IT for Recruiters Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This IT for Recruiters Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This IT for Recruiters Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this IT for Recruiters? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the IT for Recruiters there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This IT for Recruiters course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This IT for Recruiters does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT for Recruiters was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This IT for Recruiters is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Introduction Introduction 00:02:00 IT Fundamentals What is hardware and software 00:04:00 Server 00:08:00 Project Life cycle 00:06:00 Software Development Life Cycle 00:08:00 IT Terms Basics Methodologies 00:09:00 CMS 00:04:00 API 00:04:00 CI/CD 00:04:00 Stacks 00:03:00 Native and Hybrid Native Apps 00:02:00 IT Positions CTO 00:13:00 IT Architect 00:08:00 Product Owner 00:12:00 Project Manager 00:13:00 Product Manager 00:06:00 PO vs PM vs Product Manager 00:07:00 PO vs Product Manager 00:04:00 Business Analyst 00:09:00 Business Intelligence Specialist 00:06:00 Data Engineer 00:05:00 Data Scientist 00:07:00 Data Engineer vs Data Scientist 00:07:00 Agile Coach 00:14:00 Scrum Master 00:08:00 Agile Coach vs Scrum Master 00:01:00 Frontend Developer 00:06:00 Backend Developer 00:06:00 Fullstack Developer 00:04:00 Frontend vs Backend vs Fullstack Developer 00:02:00 iOS Developer 00:03:00 Android Developer 00:04:00 UX Designer 00:09:00 UI Designer 00:08:00 UX vs UI Designer 00:04:00 QA Engineer_Tester 00:09:00 SysAdmin 00:07:00 DevOps 00:05:00 SEO 00:10:00 IT Technologies. Programming Languages and Frameworks Programming languages and frameworks. Intro 00:01:00 Programming languages and frameworks 00:08:00 Java 00:03:00 JavaScript 00:02:00 Python 00:01:00 C 00:02:00 C++ 00:03:00 C# 00:02:00 HTML 00:02:00 PHP 00:02:00 SWIFT 00:02:00 Objective-C 00:01:00 Ruby 00:02:00 SQL 00:02:00 Go (Golang) 00:01:00 Databases Database 00:05:00 Types of Databases 00:07:00 From Recruiter to Recruiter The day of an IT Recruiter 00:05:00 Key principles 00:03:00 Sourcing Tipps 00:03:00 Good Bye Video Good Bye Video 00:01:00

IT for Recruiters
Delivered Online On Demand5 hours 9 minutes
£10.99

Certified Business Analysis Professional (CBAP) Boot Camp: Virtual In-House Training

By IIL Europe Ltd

Certified Business Analysis Professional™ (CBAP®) Boot Camp: Virtual In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day

Certified Business Analysis Professional (CBAP) Boot Camp: Virtual In-House Training
Delivered OnlineFlexible Dates
£2,350

gRPC [Golang] Master Class: Build Modern API and Microservices

By Packt

Better than REST APIs! Build a fast and scalable HTTP/2 API for a Go microservice with gRPC and protocol buffers (protobufs)

gRPC [Golang] Master Class: Build Modern API and Microservices
Delivered Online On Demand5 hours 25 minutes
£130.99

Building Microservices API in Go

By Packt

Master Go programming with an in-depth course covering advanced topics such as authentication, authorization, JWT tokens, and refresh tokens. Learn how to write reliable code with effective unit testing techniques, while exploring concepts such as logging, error handling, and modularization. Build secure and scalable web applications with Go to take your coding expertise to the next level.

Building Microservices API in Go
Delivered Online On Demand6 hours 44 minutes
£82.99

Docker - Swarm, Services, and Stack - Hands-On

By Packt

This course will help you to learn the Docker concepts and Docker support on a public cloud platform. You will become well-versed with Docker Service, Docker Swarm, Docker Stack, overlay networks, and load balancer. You will also explore the techniques of integrating Continuous Integration/Continuous Delivery (CI/CD) pipeline with Docker and advanced networking in Docker.

Docker - Swarm, Services, and Stack - Hands-On
Delivered Online On Demand3 hours 42 minutes
£36.99