• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

743 SQL courses

IT For Recruiters

5.0(10)

By Apex Learning

Overview This comprehensive course on IT For Recruiters will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This IT For Recruiters comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this IT For Recruiters. It is available to all students, of all academic backgrounds. Requirements Our IT For Recruiters is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 60 lectures • 05:10:00 total length •Introduction: 00:02:00 •What is hardware and software: 00:04:00 •Server: 00:08:00 •Project Life cycle: 00:06:00 •Software Development Life Cycle: 00:08:00 •Methodologies: 00:09:00 •CMS: 00:04:00 •API: 00:04:00 •CI/CD: 00:04:00 •Stacks: 00:03:00 •Native and Hybrid Native Apps: 00:02:00 •CTO: 00:13:00 •IT Architect: 00:08:00 •Product Owner: 00:12:00 •Project Manager: 00:13:00 •Product Manager: 00:06:00 •PO vs PM vs Product Manager: 00:07:00 •PO vs Product Manager: 00:04:00 •Business Analyst: 00:09:00 •Business Intelligence Specialist: 00:06:00 •Data Engineer: 00:05:00 •Data Scientist: 00:07:00 •Data Engineer vs Data Scientist: 00:07:00 •Agile Coach: 00:14:00 •Scrum Master: 00:08:00 •Agile Coach vs Scrum Master: 00:01:00 •Frontend Developer: 00:06:00 •Backend Developer: 00:06:00 •Fullstack Developer: 00:04:00 •Frontend vs Backend vs Fullstack Developer: 00:02:00 •iOS Developer: 00:03:00 •Android Developer: 00:04:00 •UX Designer: 00:10:00 •UI Designer: 00:08:00 •UX vs UI Designer: 00:04:00 •QA Engineer_Tester: 00:09:00 •SysAdmin: 00:07:00 •DevOps: 00:05:00 •SEO: 00:10:00 •Programming languages and frameworks. Intro: 00:01:00 •Programming languages and frameworks: 00:08:00 •Java: 00:03:00 •JavaScript: 00:02:00 •Python: 00:01:00 •C: 00:02:00 •C++: 00:03:00 •C#: 00:02:00 •HTML: 00:02:00 •PHP: 00:02:00 •SWIFT: 00:02:00 •Objective-C: 00:01:00 •Ruby: 00:02:00 •SQL: 00:02:00 •Go (Golang): 00:01:00 •Database: 00:05:00 •Types of Databases: 00:07:00 •The day of an IT Recruiter: 00:05:00 •Key principles: 00:03:00 •Sourcing Tipps: 00:03:00 •Good Bye Video: 00:01:00

IT For Recruiters
Delivered Online On Demand5 hours 10 minutes
£12

Ultimate PHP & MySQL Web Development Course & OOP Coding

5.0(10)

By Apex Learning

Overview This comprehensive course on Ultimate PHP & MySQL Web Development Course & OOP Coding will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ultimate PHP & MySQL Web Development Course & OOP Coding comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ultimate PHP & MySQL Web Development Course & OOP Coding. It is available to all students, of all academic backgrounds. Requirements Our Ultimate PHP & MySQL Web Development Course & OOP Coding is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 133 lectures • 10:06:00 total length •Introduction: 00:02:00 •Setup On Windows: 00:15:00 •Setup On Mac: 00:11:00 •Setup On Linux: 00:12:00 •Online Code Editor: 00:03:00 •Basic File Syntax: 00:05:00 •Printing (echo): 00:06:00 •Comments: 00:05:00 •Variables: 00:06:00 •Variable Data Types: 00:07:00 •Variable Naming: 00:03:00 •Constants: 00:02:00 •Arrays: 00:05:00 •Associative Arrays: 00:06:00 •Multidimensional Arrays: 00:04:00 •if Statement: 00:06:00 •ifelse Statement: 00:02:00 •ifelseifelse Statement: 00:05:00 •Switch Statement: 00:06:00 •while Loop: 00:06:00 •doWhile Loop: 00:03:00 •for Loop: 00:03:00 •foreach Loop: 00:05:00 •Break Statement: 00:02:00 •Continue Statement: 00:02:00 •Basic Function: 00:03:00 •Passing Function Arguments: 00:03:00 •Passing Function Arguments By Reference: 00:04:00 •Default Argument Value: 00:02:00 •Function Returning Values: 00:05:00 •Dynamic Function Calls: 00:03:00 •Variable Scope: 00:04:00 •Simple HTML Form: 00:07:00 •GET vs POST: 00:05:00 •$_SERVER ['PHP_SELF']: 00:07:00 •Validating Form Data With PHP: 00:07:00 •Required Fields: 00:05:00 •Display Error Messages: 00:05:00 •Validate Name: 00:03:00 •Validate Email: 00:03:00 •Validate URL: 00:07:00 •Keep The Values In The Form: 00:04:00 •Read File (readfile()): 00:02:00 •Open, Read & Close A File (fopen(), fread(), fclose()): 00:04:00 •Read Single Line (fgets()): 00:03:00 •Check End-Of-File (feof()): 00:02:00 •Read Single Character (fgetc()): 00:02:00 •Write To File (fwrite()): 00:03:00 •Configure php.ini File For File Uploading: 00:02:00 •Front End HTML Upload Form: 00:04:00 •PHP Upload Script: 00:15:00 •Check If File Exists: 00:03:00 •Limit File Size: 00:05:00 •Limit File Type: 00:04:00 •MySQL vs MySQLi vs PDO: 00:05:00 •Creating A Database & Table (phpMyAdmin): 00:06:00 •Connecting To A Database: 00:06:00 •Get Data Using SELECT Query: 00:10:00 •WHERE Property For Filtering: 00:03:00 •LIKE Property For Pattern Search: 00:02:00 •Sorting Results Using ORDER BY Property: 00:01:00 •Using JOINS: 00:08:00 •Insert Data Using INSERT Query: 00:04:00 •Get ID Of The Last Inserted Row: 00:02:00 •Insert Multiple Rows: 00:05:00 •Update Data Using UPDATE Query: 00:03:00 •Delete Data Using DELETE Query: 00:02:00 •Delete All Rows In A Table Using TRUNCATE Query: 00:02:00 •Delete Table Using DROP Query: 00:02:00 •Limit Data Selections Using LIMIT, ROWNUM: 00:04:00 •Create Table Using CREATE Query: 00:03:00 •Clone/Duplicate Table: 00:03:00 •Alter Table: 00:05:00 •Create Database: 00:02:00 •Drop Database: 00:02:00 •SQL Injection & Prepared Statements: 00:09:00 •What Is XML?: 00:02:00 •What Is SimpleXML?: 00:02:00 •Parse XML String: 00:08:00 •Parse XML File: 00:02:00 •Get Node Values: 00:02:00 •Get Node Values of Specific Elements: 00:03:00 •Get Node Values - Loop: 00:03:00 •Get Attribute Values: 00:02:00 •What Is The XML Expat Parser?: 00:02:00 •Initializing The XML Expat Parser: 00:10:00 •Load and Output XML Using DOM Parser: 00:02:00 •Looping Through XML Using DOM Parser: 00:03:00 •What Is AJAX?: 00:02:00 •Load Simple Data Using AJAX Front End: 00:08:00 •Load Simple Data Using AJAX Back End: 00:05:00 •Load Data From A Database Using AJAX: 00:08:00 •Send A Plain Text Email: 00:04:00 •Send A HTML Email: 00:06:00 •Email Attachments: 00:17:00 •PHPMailer Setup: 00:03:00 •Send Email Using PHPMailer: 00:04:00 •Send HTML Email Using PHPMailer: 00:04:00 •Email Attachments Using PHPMailer: 00:02:00 •What Is Object Oriented Programming (OOP)?: 00:03:00 •Basic Class With Variables: 00:04:00 •Functions: 00:05:00 •Constructor: 00:04:00 •Destructor: 00:02:00 •Inheritance: 00:06:00 •Multi Class Inheritance: 00:03:00 •Function Overriding: 00:03:00 •Public vs Private vs Protected: 00:05:00 •Interfaces: 00:04:00 •Constants: 00:03:00 •Abstract Class: 00:06:00 •Static Keyword: 00:03:00 •Final Keyword: 00:02:00 •Initiating Parent Constructor: 00:02:00 •die() Function: 00:02:00 •Custom Error Handler: 00:04:00 •Triggering An Exception: 00:03:00 •Exception Handling: 00:05:00 •Create Database & Table: 00:04:00 •User Class & Database Connection: 00:15:00 •Register User Form: 00:09:00 •Inserting User Data Into Database: 00:10:00 •Registration Form Field Validation: 00:12:00 •Securing User Password: 00:03:00 •Check If Username or Email Already Exists: 00:11:00 •Retain Data After Failed Registration: 00:03:00 •Validate an Integer Within a Range: 00:04:00 •Validate IPv6 Address: 00:03:00 •Validate URL - Must Contain QueryString: 00:03:00 •Remove Characters With ASCII Value > 127: 00:04:00 •Including & Requiring External PHP Files: 00:05:00 •Resource: 00:00:00 •Assignment - Ultimate PHP & MySQL Web Development Course & OOP Coding: 00:00:00

Ultimate PHP & MySQL Web Development Course & OOP Coding
Delivered Online On Demand10 hours 6 minutes
£12

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry

MS Azure SQL Training

By Course Cloud

Certification After successfully completing the course, you will be able to get the UK and internationally accepted certificate to share your achievement with potential employers or include it in your CV. The PDF Certificate + Transcript is available at £6.99 (Special Offer - 50% OFF). In addition, you can get a hard copy of your certificate for £12 (Shipping cost inside the UK is free, and outside the UK is £9.99).

MS Azure SQL Training
Delivered Online On Demand
£25

VMware Spring: Core Training

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot with hands-on experience and a focus on fundamentals Overview By the end of the course, you should be able to meet the following objectives: Spring configuration using Java Configuration and Annotations Aspect oriented programming with Spring Testing Spring applications using JUnit 5 Spring Data Access - JDBC, JPA and Spring Data Spring Transaction Management Simplifying application development with Spring Boot Spring Boot auto-configuration, starters and properties Build a simple REST application using Spring Boot, embedded Web Server and fat JARs or classic WARs Implementing REST client applications using RestTemplate and WebClient Spring Security Enable and extend metrics and monitoring capabilities using Spring Boot actuator Utilize Spring Boot enhancements to testing This course offers hands-on experience with the major features of Spring and Spring Boot, which includes configuration, data access, REST, AOP, auto-configuration, actuator, security, and Spring testing framework to build enterprise and microservices applications. On completion, participants will have a foundation for creating enterprise and cloud-ready applications. Introduction to Spring Java configuration and the Spring application context @Configuration and @Bean annotations @Import: working with multiple configuration files Defining bean scopes Launching a Spring Application and obtaining Beans Spring JAVA Configuration: A Deeper Look External properties & Property sources Environment abstraction Using bean profiles Spring Expression Language (SpEL) Annotation-based Dependency Injection Component scanning Autowiring using @Autowired Java configuration versus annotations, mixing. Lifecycle annotations: @PostConstruct and @PreDestroy Stereotypes and meta-annotations Factory Pattern in Spring Using Spring FactoryBeans Advanced Spring: How Does Spring Work Internally? The Spring Bean Lifecycle The BeanFactoryPostProcessor interception point The BeanPostProcessor interception point Spring Bean Proxies @Bean method return types Aspect-oriented programming What problems does AOP solve? Defining pointcut expressions Implementing various types of advice Testing a Spring-based Application Spring and Test-Driven Development Spring 5 integration testing with JUnit 5 Application context caching and the @Dirties Context annotation Profile selection with @Active Profiles Easy test data setup with @Sql Data Accss and JDBC with Spring How Spring integrates with existing data access technologies Data Access Exception hierarchy Spring?s Jdbc Template Database Transactions with Spring Transactions overview Transaction management with Spring Transaction propagation and rollback rules Transactions and integration testing Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using Command Line Runner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application Spring Security Oauth (Optional Topic) OAuth 2 Overview Implementing OAuth 2 using Spring Security OAuth Reactive Applications with Spring (Optional Topic) Overview of Reactive Programming concepts Reactive Programming support in Spring Using Spring?s reactive WebClient Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring: Core Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring: Core Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring: Core Training
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA PenTest+ (Ethical Hacking)

4.7(160)

By Janets

Register on the CompTIA PenTest+ (Ethical Hacking) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA PenTest+ (Ethical Hacking) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA PenTest+ (Ethical Hacking) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA PenTest+ (Ethical Hacking), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Section 01: Introduction Introduction 00:09:00 Section 02: Planning And Scoping Planning a Pen Test 00:09:00 Rules of Engagement 00:11:00 Resources and Budget 00:07:00 Impact and Constraints 00:05:00 Support Resources 00:13:00 Legal Groundwork 00:12:00 Scope Considerations 00:11:00 Lab Environment Setup 00:23:00 Project Strategy and Risk 00:09:00 Scope Vulnerabilities 00:14:00 Compliance-Based Assessments 00:05:00 Section 03: Surveying The Target Scanning and Enumeration 00:05:00 Scanning Demo 00:11:00 Packet Investigation 00:08:00 Packet Inspection Demo 00:06:00 Application and Open-Source Resources 00:12:00 Vulnerability Scanning 00:09:00 Vulnerability Scanning Demo 00:17:00 Target Considerations 00:16:00 Nmap Timing and Performance Options 00:07:00 Prioritization of Vulnerabilities 00:09:00 Common Attack Techniques 00:12:00 Credential Attacks 00:15:00 Weaknesses in Specialized Systems 00:18:00 Section 04: Select Your Attack Vector Remote Social Engineering 00:07:00 Spear Phishing Demo 00:10:00 In-Person Social Engineering 00:12:00 Network-Based Exploits 00:07:00 FTP Exploit Demo 00:08:00 Man-in-the-middle Exploits 00:07:00 Wireless Exploits 00:14:00 Application Exploits, Part 1 00:06:00 SQL Injection Demo 00:09:00 Application Exploits, Part 2 00:08:00 Application Exploits, Part 3 00:09:00 Code Vulnerabilities 00:17:00 Local Host Vulnerabilities 00:05:00 Privilege Escalation (Linux) 00:10:00 Privilege Escalation (Windows) 00:06:00 Misc. Privilege Escalation 00:08:00 Misc. Local Host Vulnerabilities 00:08:00 Physical Security 00:11:00 Post-Exploitation Techniques 00:11:00 Persistence and Stealth 00:11:00 Section 05: Selecting Pen Testing Tools Nmap Scoping & Output Options 00:21:00 Pen Testing Toolbox 00:07:00 Using Kali Linux 00:06:00 Scanners & Credential Tools 00:10:00 Code-Cracking Tools 00:05:00 Open-Source Research Tools 00:07:00 Wireless and Web Pen Testing Tools 00:11:00 Remote Access Tools 00:06:00 Analyzers and Mobile Pen Testing Tools 00:03:00 Other Pen Testing Tools 00:05:00 Using Scripting in Pen Testing 00:13:00 Bash Scripting Basics 00:15:00 Bash Scripting Techniques 00:10:00 PowerShell Scripts 00:04:00 Ruby Scripts 00:07:00 Python Scripts 00:07:00 Scripting Languages Comparison 00:11:00 Section 06: Reporting And Communication Writing Reports 00:16:00 Post-Report Activities 00:06:00 Mitigation Strategies 00:05:00 Communication 00:10:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 42 minutes
£25

Flutter & Dart Development for Building iOS and Android Apps

4.7(160)

By Janets

Register on the Flutter & Dart Development for Building iOS and Android Apps today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Flutter & Dart Development for Building iOS and Android Apps is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Flutter & Dart Development for Building iOS and Android Apps Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Flutter & Dart Development for Building iOS and Android Apps, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Section 01: Introduction Introduction 00:02:00 Setup On Windows 00:16:00 Setup On Linux 00:14:00 Setup On Mac iOS 00:14:00 Setup On Mac Android 00:12:00 App Base Code 00:03:00 Section 02: Widgets Text 00:04:00 Container 00:04:00 Row 00:05:00 Column 00:02:00 Stack 00:02:00 Image 00:06:00 Center 00:02:00 Padding 00:03:00 Align 00:02:00 Constrained Box 00:03:00 Baseline Class 00:03:00 Aspect Ratio 00:03:00 Sized Box 00:02:00 Transform 00:03:00 Section 03: Gestures Pointers 00:06:00 Tap 00:02:00 Double Tap 00:02:00 Long Press 00:03:00 Vertical Drag 00:04:00 Horizontal Drag 00:04:00 Pan 00:04:00 Section 04: Navigation Components Scaffold 00:06:00 App bar 00:05:00 Bottom Navigation Bar 00:08:00 TabBar View 00:07:00 Drawer 00:05:00 SliverApp Bar 00:07:00 Section 05: Input/Selection Components FlatButton 00:04:00 RaisedButton 00:03:00 DropdownButton 00:09:00 TextField 00:04:00 CheckBox 00:06:00 Radio Button 00:04:00 PopupMenuButton 00:07:00 IconButton 00:04:00 ButtonBar 00:03:00 Floating Action Button 00:04:00 Switch 00:04:00 Slider 00:05:00 Date Picker 00:05:00 Time Picker 00:07:00 SimpleDialog 00:08:00 AlertDialog 00:06:00 BottomSheet 00:06:00 Expansion Panel List and Expansion Panel 00:07:00 SnackBar 00:07:00 Cupertino Setup 00:02:00 Cupertino Action Sheet 00:06:00 Cupertino Activity Indicator 00:01:00 Cupertino Alert Dialog 00:04:00 Cupertino Button 00:03:00 CupertinoPageScaffold 00:04:00 CupertinoPicker 00:04:00 CupertinoPopupSurface 00:04:00 CupertinoSegmentedControl 00:04:00 CupertinoSlider 00:04:00 CupertinoSwitch 00:03:00 CupertinoNavigationBar 00:04:00 CupertinoTabBar 00:05:00 CupertinoTabScaffold 00:04:00 CupertinoTextField 00:04:00 Section 06: Information Displays Icons 00:04:00 Chip 00:03:00 Tooltip 00:02:00 DataTable 00:09:00 Card 00:06:00 Linear Progress Indicator 00:03:00 Circular Progress Indicator 00:04:00 Section 07: Layout GridView 00:03:00 ListView & ListTile 00:04:00 Stepper & Step 00:07:00 Divider & divideTiles 00:05:00 Aligning Widgets 00:03:00 Sizing Widgets 00:03:00 Nesting Rows and Columns 00:03:00 Add, Update and Delete Widgets 00:06:00 Section 08: Navigation & Routing Navigate To A New Screen and Back 00:06:00 Multiple Files For Each Screen 00:03:00 Send Data To A New Screen 00:05:00 Return Data From A Screen 00:05:00 Navigate With Named Routes 00:03:00 Animating A Widget Across Screens 00:02:00 Stateless vs Stateful Widgets 00:08:00 Section 09: Animation Tween Animation 00:07:00 Staggered Animation 00:04:00 Reverse and Stop Animations 00:02:00 Section 10: Platform Specific Code Call Android Java Code 00:08:00 Send Parameters To Android Java Code 00:07:00 Call Android Kotlin Code 00:08:00 Send Parameters To Android Kotlin Code 00:05:00 Call iOS Objective-C Code 00:10:00 Send Parameters To iOS Objective-C Code 00:05:00 Call iOS Swift Code 00:08:00 Send Parameters To iOS Swift Code 00:05:00 Section 11: Building & Releasing Remove Debug Badge 00:01:00 Build & Release For Android 00:04:00 Build & Release For iOS 00:06:00 Section 12: Networking Fetch Data From The Internet 00:13:00 Making authenticated requests using HTTP Headers 00:03:00 Parsing JSON In The Background 00:17:00 Working With WebSockets 00:10:00 Section 13: Data Persistence Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Storing Key-Value Data On Disk 00:03:00 Data Persistence Using SQLite 00:04:00 Section 14: Creating An App Calculator Part 1 - TabBar Creation 00:12:00 Calculator Part 2 - Implementing The Tabs 00:05:00 Calculator Part 3 - Tab Persistence 00:03:00 Changing Android App Icon 00:05:00 Changing iOS App Icon 00:01:00 Change App Display Name 00:05:00

Flutter & Dart Development for Building iOS and Android Apps
Delivered Online On Demand9 hours 51 minutes
£25

Ethical Hacking and Pentesting Ultimate Hands-on Online Training

By Lead Academy

Ethical Hacking and Pentesting Ultimate Hands-on Online Training Course Overview Are you looking to begin your ethical hacker career or want to develop more advanced skills in ethical hacker? Then this ethical hacker course will set you up with a solid foundation to become a confident ethical hacker and help you to develop your expertise in ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a ethical hacker. The ethical hacking and pentesting ultimate hands-on online training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a ethical hacker. This comprehensive ethical hacking and pentesting ultimate hands-on online training course is the perfect way to kickstart your career in the field of ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a ethical hacking and pentesting ultimate hands-on online training or want to learn more skills on ethical hacker but unsure of where to start, then this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This ethical hacking and pentesting ultimate hands-on online training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who is this Ethical Hacking and Pentesting Ultimate Hands-on Online Training course for? This comprehensive ethical hacking and pentesting ultimate hands-on online training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of ethical hacker. Entry Requirement There are no academic entry requirements for this ethical hacking and pentesting ultimate hands-on online training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This ethical hacking and pentesting ultimate hands-on online training course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox Video and lab - Creating a Virtual install of Kali using VirtualBox Video and Lab - Creating a Virtual Install of CSI Linux 2021.2 Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Video - Installing the VirtualBox Extension pack Video - Taking a Snapshot of Your Current Configuration Passive Reconnaissance Video and Lab - Gathering Information Using Maltego Video and Lab - Gathering Information Using CSI Linux Investigator Video and Lab - Preparing CSI Linux to Use Shodan Video and Lab - Using Shodan to Find Vulnerable Devices Nmap Video and Lab - Introduction to NMap Video and lab - NMap Scripting Engine (NSE) Video and lab - Scanning for WannaCry Ransomware Scanning for Vulnerabilities Using Nessus Video and Lab - Installing NESSUS Using Docker Video and lab - Scanning for Vulnerabilities Using Nessus Video - Using Your Nessus Scan Results Scanning for Vulnerabilities Using OpenVAS Video and Lab - Installing OpenVAS Using Docker Video and Lab - Scanning for Vulnerabilities Using OpenVAS Exploiting Microsoft Windows Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP Video and Lab - Establishing A VNC Shell Using Meterpreter Video and Lab - Using Meterpreter to backdoor Windows XP Exploiting Linux Video and lab - Installing Metasploitable2 Using VirtualBox Social Engineering Video and Lab - Using the Social Engineering Toolkit (SET) BASH Scripting for Pentesters Video and Lab - Introduction to BASH Scripting Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports Video and Lab - Password Cracking Using Medusa Video and Lab - Passwords Cracking Using Mimikatz Pentesting Wireless Networks Video and Lab - Installing a Wireless Adapter in Kali Video and Lab - Hacking a Wireless Network Using Kali Linux Wireless Deauthentication Attack PMKID Client-less Wireless Attack Using Bettercap Web Based Application Attacks Video and Lab - Installing w3af in Kali Linux Using Docker Video and Lab - Conducting A Website Vulnerability Scan Using w3af Video and Lab - Performing a Browser Based Attack Video and lab - SQL Injection Attack Using SQLmap Browser Exploitation Framework (BeEF) Video - Configure Kali for Exploitation the WAN Video and lab - The Browser Exploitation Framework (BeEF) Remaining anonymous Video and Lab - Anonymize Kali Using Whonix,,,,, Capture The Flag Walkthrough - Mr. Robot Video Walk Through -Key #1 Video Walk through - Key #2 Video Walk Through - Key #3 Capture The Flag Walkthrough - Stapler Video - Capture the Flag - Stapler Part 1 Video - Capture the Flag - Stapler Part 2 Video - Capture the Flag - Stapler Part 3 Order Your Certificate Now Order Your Certificate Now Get Your Insurance Now Get Your Insurance Now Feedback Feedback Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking and Pentesting Ultimate Hands-on Online Training
Delivered Online On Demand
£25

SC-200: Microsoft Security Operations Analyst

By Packt

A carefully structured course loaded with lab exercises that will help you learn all about implementing Microsoft Defender for Endpoint platform the right way. The course's learning path aligns with the SC-200: Microsoft Security Operations Analyst Exam.

SC-200: Microsoft Security Operations Analyst
Delivered Online On Demand13 hours 1 minutes
£41.99

Flask for Beginners

By Packt

Learn Flask, the simple yet powerful Python web framework. This course is a ridiculously simple way to learn Flask in less than a weekend.

Flask for Beginners
Delivered Online On Demand6 hours 32 minutes
£26.99