• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5671 Software courses

TEMA & HTRI Heat Exchanger Design & Cost Saving Management – Virtual Instructor Led Training (VILT)

By EnergyEdge - Training for a Sustainable Energy Future

Acquire in-depth knowledge of heat exchanger design and cost-saving management with EnergyEdge's TEM & HTRI course. Join our virtual instructor-led training to stay ahead in the industry.

TEMA & HTRI Heat Exchanger Design & Cost Saving Management – Virtual Instructor Led Training (VILT)
Delivered in Internationally or OnlineFlexible Dates
£2,099 to £2,199

A Detailed Guide to the OWASP Top 10

By Packt

Welcome to this course on OWASP Top 10 where we will take a closer look at the top ten vulnerabilities that applications face today. This is a mix of both theory as well as practical and explains to you the real-world cyber-attacks on various companies and web applications.

A Detailed Guide to the OWASP Top 10
Delivered Online On Demand2 hours 1 minutes
£82.99

Java Certification Level 1 Physiological investigations have shown that figuring out how to communicate in at least two dialects can enormously profit the psychological interaction. Not exclusively would communication be able to extend dramatically when learning another dialect, however it enormously improves the mind's usefulness. Curiously, learning diverse codings can likewise give stunning advantages. These advantages are mental, but on the other hand are a helpful application in regular day to day existence. Cell phones, leaving key dandies, security identifications and utilizing a gadget to open a vehicle entryway are a portion of the day by day things that have been customized to act with a particular goal in mind. Seeing how to program, can be a stunning resource and keeping in mind that there are various dialects, none is very as simple to learn as Java. Java was made in view of productivity and consistency. The objective was to make a program with more noteworthy abilities than C/C++ however with greater effortlessness. In this Java Programming for Beginners course you will become familiar with the nuts and bolts of programming utilizing the Java language just as a significant number of the advantages that will make ready for proficient programming. What you will realize in this course: Instructions to set up a PC for Java programming and find out about pre-introduced programs Find out about the 'modulus administrator' and what it implies The most effective method to distinguish a remark line and what the motivation behind a remark is in a program Find out about the length strategy Find out about information structures Find out about class-object relationship and begin finding out about object-arranged programming in Java Find out about Booleans and what reason they serve The advantages of this course: Learning the most generally utilized code Realizing Java can build proficient freedoms as a developer or computer programmer. Java software engineers are sought after and are among the most generously compensated in the business Java has an exceptionally top to bottom API and can be utilized to execute different sorts of programming It will make you a superior engineer with its rich IDEs (Integrated Development Environment) giving ideas and advising of mistakes Java will assist you with understanding complex programming ideas

Java Level 1
Delivered Online On Demand
£50

Rhino 3D Basic to Intermediate Training

By London Design Training Courses

Why Choose Rhino 3D Basic to Intermediate Training Course? Course Link Learn NURBS modeling, curves, and 3D printing prep in our Rhino 3D Course. Master materials, textures, and lighting for 2D & 3D modeling. A basic understanding of Rhino is valuable for creative professionals pursuing careers in product, furniture, architectural, or jewelry design. Duration: 10 hrs Method: 1-on-1, Personalized attention Schedule: Tailor your own hours of your choice, available from Mon to Sat between 9 am and 7 pm. Supported Learning Approach: Personalized Support: No matter the course duration, our team is dedicated to supporting you every step of the way. From homework assignments to video tutorials and free after-support, we ensure a supportive path to software expertise. One to One Course Advantage: The One-to-One Course Advantage offers personalized learning, flexible scheduling, focused feedback, and a private environment to boost confidence and achieve your specific objectives. Rhino 3D Basic to Intermediate Training Course Course Duration: 10 hours Course Description: 3D modeling journey with our Rhino 3D Basic to Intermediate Training Course. Ideal for beginners, master the powerful Rhino 3D software used by architects and designers. Explore the interface, create captivating 3D models, and enhance your designs with comprehensive tools and techniques. Course Outline: I. Introduction to Rhino 3D (1 hour) - Explore the Rhino 3D interface and discover essential tools for 3D modeling - Master seamless navigation and viewport controls - Grasp the significance of units and tolerance for precise creations - Customize your workspace for an efficient and personalized workflow II. Creating Basic 3D Objects (3 hours) - Unleash your creativity by crafting simple yet captivating 3D shapes - Gain expertise in editing objects and working with curves for refinement - Dive into the world of surfaces and solids, refining your skills - Effortlessly use transformations and copying techniques to enhance your designs III. Organizing and Enhancing Models (2 hours) - Streamline your projects with smart organization using groups and layers - Elevate the visual appeal of your models with vibrant colors, materials, and textures - Illuminate your creations with fundamental lighting techniques IV. Advanced Modeling Techniques (2 hours) - Master the art of tackling complex shapes with advanced modeling tools - Explore the nuances of creating and editing curves and surfaces - Enhance your proficiency in handling solids and understand Boolean operations and trimming techniques V. Introduction to Rendering (1 hour) - Gain an overview of rendering and its role in visualizing your designs - Understand Rhino's powerful render engine and its capabilities - Apply basic materials to elevate the quality of your renderings VI. Exporting and Importing (1 hour) - Acquire a comprehensive understanding of file formats for seamless sharing - Prepare your models for 3D printing using best practices - Integrate models from other software into Rhino 3D for a unified workflow VII. Conclusion and Next Steps (30 minutes) - Recapitulate the knowledge gained throughout the course - Access valuable tips and resources for continuous learning and growth - Engage in an interactive Q&A session to receive feedback and support Note: The above course outline is flexible, ensuring it meets the unique needs and skill levels of learners. Download - Rhino

Rhino 3D Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£290

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Python Programming & Machine Learning - QLS Certificate

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Python Programming & Machine Learning - QLS Certificate
Delivered Online On Demand
£300

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)

By Packt

The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)
Delivered Online On Demand14 hours 39 minutes
£261.99

Blockchain Architecture Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks

Blockchain Architecture Training
Delivered OnlineFlexible Dates
Price on Enquiry

ISTQB Certified Tester - Advanced Level Test Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Test Programme Managers, Test Managers, and anyone else wishing to take the ISTQB© Certified Tester Advanced Level Test Manager examination. Overview Whilst this course is focused on the syllabus, giving participants the maximum chance of passing the examination, it also contains many real world practical examples. On completion of this course, attendees will have an advanced understanding of test design techniques and will be fully prepared to take the ISTQB© Certified Tester Advanced Level Test Manager examination. ISTQB© is the standard for international qualifications in software testing at an advanced level. The course thoroughly prepares attendees for the ISTQB© Certified Tester Advanced Level Test Manager examination. Testing Process The fundamental test process Test levels and test types Test planning, monitoring and control Test analysis Test design Test implementation Test execution Evaluating exit criteria and reporting Test closure activities Test Management Test management in context Risk-based testing and other approaches for test prioritization and effort allocation Test documentation and other work products Project risk management Other test work products Test estimation Defining and using test metrics Business value of testing Distributed, outsourced, and insourced testing Managing the application of industry standards Reviews Management reviews and audits Managing reviews Metrics for reviews Managing formal reviews Defect Management The defect lifecycle and the software development lifecycle Cross-functional defect management Defect report information Assessing process capability with defect report information Improving the Testing Process Introduction Test improvement process Improving the testing process Improving the testing process with TMMI Improving the testing process with TPI Next Improving the testing process with CTP Improving the testing process with STEP Test Tools and Automation Tool selection Return on investment (ROI) Selection process Tool lifecycle Tool metrics People Skills ? Team Composition Individual skills Test team dynamics Fitting testing within an organization Motivation Communication

ISTQB Certified Tester - Advanced Level Test Manager
Delivered OnlineFlexible Dates
Price on Enquiry