• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

736 SQL courses delivered Online

Master Spring boot 3.0 and MongoDB

4.5(3)

By Studyhub UK

Embark on a transformative journey into the realm of cutting-edge development with our course, 'Master Spring Boot 3.0 and MongoDB.' Crafted with precision and innovation, this course is a gateway to mastering the intricate dance between Spring Boot and MongoDB, providing you with the skills to revolutionize your coding prowess. Immerse yourself in an engaging learning experience, where each section unfolds like a chapter in a captivating novel, unveiling the secrets of MongoDB, the nuances of Bootstrapping applications, and the artistry of integrating OpenAPI. It's more than a course; it's an odyssey into the heart of modern development, beckoning you to embrace a new era of programming possibilities. In this dynamic learning adventure, traverse through the course curriculum like an explorer unraveling a map to success. From laying the groundwork in the introduction to conquering complex queries and MongoDB templates, you'll navigate the landscape of development with confidence. The course is not just about acquiring knowledge; it's about transforming that knowledge into practical expertise. Whether you're a novice eager to embark on a coding expedition or a seasoned developer seeking to enhance your skills, this course is your compass to navigate the vast territories of Spring Boot and MongoDB, promising a voyage filled with discovery and mastery. Learning Outcomes Develop a profound understanding of MongoDB, from environmental preparation to advanced query methods. Master the art of bootstrapping applications, gaining hands-on experience in crafting robust and efficient systems. Uncover the intricacies of collections relationships and the use of DBRef, adding a layer of sophistication to your database interactions. Seamlessly integrate OpenAPI into your projects, enhancing the accessibility and documentation of your applications. Acquire expertise in document queries and MongoDB templates, empowering you to build scalable and efficient databases. Why choose this Master Spring boot 3.0 and MongoDB course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Master Spring boot 3.0 and MongoDB course for? Aspiring developers keen on mastering the Spring Boot-MongoDB synergy. Software engineers looking to deepen their understanding of advanced database operations. Students and coding enthusiasts eager to explore the latest tools in the development landscape. Professionals seeking to upgrade their skill set in line with industry demands. Entrepreneurs or tech enthusiasts aiming to build robust applications from the ground up. Career path MongoDB Developer: £40,000 - £60,000 Spring Boot Engineer: £45,000 - £70,000 Database Architect: £55,000 - £80,000 Full Stack Developer: £50,000 - £75,000 Java Developer (Specializing in Spring Boot): £45,000 - £65,000 API Integration Specialist: £50,000 - £70,000 Prerequisites This Master Spring boot 3.0 and MongoDB does not require you to have any prior qualifications or experience. You can just enrol and start learning. This Master Spring boot 3.0 and MongoDB was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction What is MongoDB 00:02:00 The Difference Between SQL and NoSQL 00:03:00 How to Choose Between SQL and NoSQL 00:04:00 Section 02: Prepare The Mongo Environment MongoDB UI Tools 00:01:00 Why Use Docker for Development 00:01:00 Create an Empty Docker Compose File 00:02:00 Mongo Server (Docker Compose) 00:04:00 Mongo Express (Docker Compose) 00:03:00 Run and Test 00:03:00 Section 03: Mongo Terms Collections and Documents in Mongo 00:03:00 Section 04: Bootstrapping The Application Create a New Spring Boot 3.0 Project 00:04:00 Project Structure 00:02:00 Include the Docker Compose with the Project and Run It 00:04:00 Project Architecture 00:03:00 Connect to MongoDB 00:03:00 Create a New Database 00:01:00 Understand Admin - Local and Config Databases 00:05:00 Create a Java Class 00:04:00 Transform the Java Class into a Collection 00:02:00 Create a Mongo Repository 00:02:00 Insert the First Data into the Collection 00:06:00 Create a Product Service 00:04:00 Save the product 00:03:00 Find Product by ID 00:01:00 Find All Products 00:01:00 Delete Product 00:01:00 Section 05: CRUD Operations Create Product Controller 00:02:00 Save Product Operation 00:02:00 Find All Products 00:01:00 Find Product by ID 00:01:00 Delete Product 00:02:00 Test the CRUD Operations 00:06:00 Section 06: DBRef And Collections Relationships Extend the Product Model 00:02:00 Create Category Java Class 00:02:00 User Category as a Field 00:03:00 Relationship between Category and Product 00:01:00 Transform the Category to a Collection 00:01:00 Create a Category Repository 00:01:00 Insert Categories at Startup 00:02:00 The Issue in Linking Collections 00:03:00 Add Relationship Between Collections 00:04:00 Section 07: OpenApi Integration Add OpenApi Dependency 00:02:00 Test and Play with Swagger UI 00:06:00 Section 08: Documents Queries And Mongo Template Extend the Product Model 00:02:00 Create a Search Service 00:01:00 What is MongoTemplate 00:02:00 Is() Query 00:07:00 Testing the Is() Query 00:02:00 Regex() Query 00:06:00 Lt() Query 00:03:00 Gt() Query 00:02:00 Sorting Data 00:05:00 Paging and Sorting 00:06:00 Section 09: Query Methods Create a Query Method Service 00:03:00 FindByX Query 00:06:00 FinByX Ignore Case Query 00:02:00 FinByX starting with query 00:03:00 FinByX ending with query 00:02:00 FinByX containing query 00:04:00 FinByX less than 00:02:00 FinByX greater than 00:01:00 FinByX between 00:02:00 FinByX and SortByY 00:04:00 Paging and Sorting 00:07:00

Master Spring boot 3.0 and MongoDB
Delivered Online On Demand3 hours 5 minutes
£10.99

Microsoft Azure Cloud Concepts

4.9(27)

By Apex Learning

Overview This comprehensive course on Microsoft Azure Cloud Concepts will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Microsoft Azure Cloud Concepts comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Microsoft Azure Cloud Concepts. It is available to all students, of all academic backgrounds. Requirements Our Microsoft Azure Cloud Concepts is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 29 lectures • 03:33:00 total length •Unit 01: What will you learn and Cloud Concepts: 00:18:00 •Unit 02: Core Azure architectural components: 00:18:00 •Unit 03: LAB Create a Windows and Linux VM Computer: 00:10:00 •Unit 04: LAB Container creation: 00:04:00 •Unit 05: Storage with Azure: 00:04:00 •Unit 06: LAB Create a storage account: 00:07:00 •Unit 07: Network concepts: 00:03:00 •Unit 08: Lab Network Peering: 00:16:00 •Unit 09: Lab scale set: 00:11:00 •Unit 10: Marketspace and Serverless: 00:07:00 •Unit 11: Event HUB and Logic APPS: 00:07:00 •Unit 12: DevOps Overview: 00:04:00 •Unit 13: Azure Databases Overview: 00:04:00 •Unit 14: Lab SQL: 00:08:00 •Unit 15: What are AI and machine learning: 00:10:00 •Unit 16: Powershell and CLI: 00:09:00 •Unit 17: Azure Advisor: 00:05:00 •Unit 18: Review Core Azure: 00:04:00 •Unit 19: Azure security compliance and trust: 00:03:00 •Unit 20: Lab DDOS and NSGs: 00:07:00 •Unit 21: Authentication and Authorisation: 00:07:00 •Unit 22: Azure security centre: 00:06:00 •Unit 23: LAB Azure key vault and AIP overview: 00:06:00 •Unit 24: Azure Advanced Threat Protection (Azure ATP): 00:06:00 •Unit 25: Azure monitoring: 00:05:00 •Unit 26: Manage Azure Governance: 00:07:00 •Unit 27: Azure privacy and compliance: 00:04:00 •Unit 28: Summary: 00:03:00 •Unit 29: Azure Pricing and support: 00:10:00

Microsoft Azure Cloud Concepts
Delivered Online On Demand3 hours 33 minutes
£12

Accredited Microsoft Access 2007 Professional

By iStudy UK

Microsoft Access is the most powerful and well-known software for creating databases. This course is the advanced version of Microsoft Access 2007 beginner's level, as it will drive you to the advanced level of Microsoft Access 2007. Learn about the advanced features and functions of access 2007. Explore the advanced database tool and how can they be used. At the end of this course, you will be able to create databases as professionals. In this course you will learn the necessary skills, knowledge and information of Microsoft Access.  Course Highlights Accredited Microsoft Access 2007 Professional is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Accredited Microsoft Access 2007 Professional into 13 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 11 hours hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Accredited Microsoft Access 2007 Professional Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Accredited Microsoft Access 2007 Professional is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Accredited Microsoft Access 2007 Professional is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module One - Getting Started 00:30:00 Module Two - Advanced Table Tasks 01:00:00 Module Three - Advanced Form Tasks 01:00:00 Module Four - Advanced Reporting Tasks 01:00:00 Module Five - Understanding Relationships 01:00:00 Module Six - Advanced Query Tasks 01:00:00 Module Seven - Working with SQL 01:00:00 Module Eight - Linking Data 01:00:00 Module Nine - Importing Data 01:00:00 Module Ten - Exporting Data 01:00:00 Module Eleven - Advanced Database Tools 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities Activities - Microsoft Access 2007 Advanced Level 00:00:00 Mock Exam Final Exam

Accredited Microsoft Access 2007 Professional
Delivered Online On Demand11 hours
£25

Spark Programming in Scala for Beginners with Apache Spark 3

By Packt

This course does not require any prior knowledge of Apache Spark or Hadoop. The author explains Spark architecture and fundamental concepts to help you come up to speed and grasp the content of this course. The course will help you understand Spark programming and apply that knowledge to build data engineering solutions.

Spark Programming in Scala for Beginners with Apache Spark 3
Delivered Online On Demand6 hours 47 minutes
£14.99

NSE 5 Bundle

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the day-to-day management of a FortiAnalyzer appliance and FortiGate security information. Overview Describe key features and concepts of FortiAnalyzer Deploy an appropriate architecture Manage ADOMs on both FortiAnalyzer and the devices that log to it Configure RAID Register supported devices Encrypt log transmission (SSL / IPSec) View & analyze current and historical logs (FortiView) Monitor events Apply disk quotas to log data from devices Backup, restore, and forward log data Use content archiving (summary and full) Understand the different stages of data processing, from receiving logs to compiling reports Understand SQL queries and datasets used by FortiAnalyzer reports Design datasets, charts, and custom reports Generate reports by schedule or on demand In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. Additional course details: Nexus Humans NSE 5 Bundle training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NSE 5 Bundle course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NSE 5 Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Peoplesoft PeopleTools I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Administrators Developers Implementers Systems Administrators Overview Understand the PeopleSoft system architecture, application development methodology, and tool set so you can build and customize PeopleSoft applications efficiently to meet your organizations business requirements. Quickly and efficiently create functionality in PeopleSoft applications to take advantage of the unique capabilities of these applications. Gain Hands-On Experience Using PeopleSoft Application Designer Enrolling in this course will also give you hands-on experience with the Application Designer, the PeopleSoft integrated development environment (IDE). Learn to create and modify PeopleSoft definitions, including fields, records, pages and components. By the end of this course, you'll be able to use Application Designer to create and deploy PeopleSoft classic applications and fluid applications This PeopleTools I training introduces the PeopleSoft application development methodology. This 5-day course gives you a general overview of PeopleSoft system architecture, as well as the tool set used to develop new applications or customize existing PeopleSoft applications. Navigating PeopleSoft ApplicationsExplaining the PeopleSoft ArchitectureValidating DataUsing Application Designer to Develop ApplicationsDesigning the ApplicationCreating Record DefinitionsBuilding SQL TablesCreating Page DefinitionsRegistering ComponentsTesting ApplicationsEditing the Portal Registry StructureCreating Menu DefinitionsUnderstanding the Fluid User InterfaceCreating Fluid PagesUsing Delivered CSS Additional course details: Nexus Humans Oracle Peoplesoft PeopleTools I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Peoplesoft PeopleTools I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Peoplesoft PeopleTools I
Delivered OnlineFlexible Dates
Price on Enquiry

Developer Training for Spark and Hadoop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Hadoop Developers Overview Through instructor-led discussion and interactive, hands-on exercises, participants will navigate the Hadoop ecosystem, learning topics such as:How data is distributed, stored, and processed in a Hadoop clusterHow to use Sqoop and Flume to ingest dataHow to process distributed data with Apache SparkHow to model structured data as tables in Impala and HiveHow to choose the best data storage format for different data usage patternsBest practices for data storage This training course is the best preparation for the challenges faced by Hadoop developers. Participants will learn to identify which tool is the right one to use in a given situation, and will gain hands-on experience in developing using those tools. Course Outline Introduction Introduction to Hadoop and the Hadoop Ecosystem Hadoop Architecture and HDFS Importing Relational Data with Apache Sqoop Introduction to Impala and Hive Modeling and Managing Data with Impala and Hive Data Formats Data Partitioning Capturing Data with Apache Flume Spark Basics Working with RDDs in Spark Writing and Deploying Spark Applications Parallel Programming with Spark Spark Caching and Persistence Common Patterns in Spark Data Processing Spark SQL and DataFrames Conclusion Additional course details: Nexus Humans Developer Training for Spark and Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developer Training for Spark and Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Developer Training for Spark and Hadoop
Delivered OnlineFlexible Dates
Price on Enquiry

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

React Bootcamp with .NET API (Router, Redux Toolkit, Hooks)

By Packt

This comprehensive course is designed to take you on a journey of mastering React, the popular JavaScript library for building dynamic user interfaces, and combining it with the power of .NET API for seamless back-end integration. This course will provide you with a solid foundation and hands-on experience in building full-stack applications.

React Bootcamp with .NET API (Router, Redux Toolkit, Hooks)
Delivered Online On Demand22 hours 20 minutes
£82.99