• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5898 Software courses

Test-Driven Development - A Stunningly Quick Introduction

By IIL Europe Ltd

Test-Driven Development - A Stunningly Quick Introduction "The job of QA is not just to do testing it's to build quality in.How often have you heard that sentence? And how often has it been followed up with solid practices for actually building quality in? Test-Driven Development (TDD) is one of the foundational practices of high-quality product development. Popularized nearly 20 years ago, TDD is an important skill for high-quality software development. If you want it to be easier to build high-quality code, then you need to understand TDD. In this hands-on session, we'll learn by doing. Richard will facilitate a coding dojo, a safe place to learn and practice the skills of test-driven development. We'll mob-program together on a coding kata - an easy programming problem - to learn TDD, refactoring, clean code, code smells, and more - all in the pursuit of technical agility, business agility, and a great product that people love. To follow along, bring your laptop and development environment. You'll leave with an introduction to solid new skills, including: Test-driven development (TDD) Extreme Programming (XP) Refactoring and refactoring patterns Code smells Mob programming

Test-Driven Development - A Stunningly Quick Introduction
Delivered Online On Demand30 minutes
£15

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Computer Maintenance and Repair Course

By Hi-Tech Training

The Computer Maintenance & Repair Technician course aims to enable participants to diagnose and repair system level faults in computer-based systems at the foundation level.

Computer Maintenance and Repair Course
Delivered Online
£85 to £685

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

BA29 - User Acceptance Testing for Business Analysts

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for the Business Analyst professional who is involved with testing the functionality of technology projects. Overview Develop an understanding about basic concepts associated with User Acceptance TestingSee how UAT applies to the Software Development Lifecycle (SDLC)Recognize benefits of improved quality of deployed software using User Acceptance TestingIdentify the key roles, activities and deliverables which make up User Acceptance Testing Use a Business Use Case to define scenarios for testingCreate a UAT test plan and write UAT test cases with associated test dataUnderstand the process for testing functional and non-functional requirementsIdentify the challenges of testing vendor-supplied applications This course looks at the issues which drive the need for a UAT process & describes the components of the process. It is designed to help Business Analysts to develop an understanding of their role, the process, and the deliverables associated with UAT. Day 1 Software Testing - the Basics Understanding the Tester?s Terminology The UAT Planning Process Day 2 UAT Test Coverage Creating & Executing the UAT Test Cases Verifying the Test Results Testing Vendor-Supplied Applications Additional course details: Nexus Humans BA29 - User Acceptance Testing for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA29 - User Acceptance Testing for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA29 - User Acceptance Testing for Business Analysts
Delivered OnlineFlexible Dates
Price on Enquiry

REST API Automation With REST Assured - Zero To Hero

By Packt

Are you looking to step into the REST API automation industry with the latest technologies in the market? Are you keen to learn REST API automation using REST Assured with Java and other latest framework technologies? Interested in learning how REST APIs are automated in projects? Then this course is for you.

REST API Automation With REST Assured - Zero To Hero
Delivered Online On Demand13 hours 58 minutes
£149.99

HP iMC for engineers

5.0(3)

By Systems & Network Training

HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.

HP iMC for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

PCB Design with Eagle

4.8(9)

By Skill Up

Learn how to design your own PCBs with Eagle, the most popular PCB design software. This course is perfect for beginners and hobbyists who want to learn the basics of PCB design and build their own electronic devices.

PCB Design with Eagle
Delivered Online On Demand3 hours 23 minutes
£25

Master Business Networking in Just 1 Day - Join our Workshop in Wolverhampton

By Mangates

Business Networking 1 Day Training in Wolverhampton

Master Business Networking in Just 1 Day - Join our Workshop in Wolverhampton
Delivered In-Person + more
£595 to £795

AAT Level 1 Award in Bookkeeping

By London School of Science and Technology

This Level 1 qualification introduces the role of a bookkeeper and the underpinning knowledge to identify and carry out simple different bookkeeping activities, such as income and expenditure, profit and loss, and assets and liabilities. Course Overview This Level 1 qualification introduces the role of a bookkeeper and the underpinning knowledge to identify and carry out simple different bookkeeping activities, such as income and expenditure, profit and loss, and assets and liabilities. It also offers an introduction into the role, and the benefits and risks associated with bookkeeping software. The jobs it can lead to: • Cashier • Clerical assistant • Trainee bookkeeping assistant Entry requirements: If you have no prior accounting knowledge or bookkeeping knowledge, this entry-level bookkeeping qualification will give you an understanding of manual, single-entry bookkeeping basics. For the best chance of success we recommend that students begin their studies with a good standard of English and maths. It provides a solid grounding for students before moving on to the Level 2. Course Content: Bookkeeping fundamentals: This unit introduces students to the role of a bookkeeper and simple bookkeeping techniques, while providing an understanding on why it’s important to keep accurate and up to date financial information in business. Students will learn how to identify a range of bookkeeping transactions including income, expenses, and profit and loss, as well as gaining an understanding of the benefits and risks associated with bookkeeping software and the importance of ethical behaviour. Learning outcomes: • Understand the role of the bookkeeper. • Understand financial transactions. • Process customer and supplier transactions. • Process receipts and payments. • Understand the benefits and risks of using accounting software to complete bookkeeping tasks. DURATION 110 Hours WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate

AAT Level 1 Award in Bookkeeping
Delivered In-PersonFlexible Dates
£395