GitHub is one of the most important code hosting platforms. This hands-on course will help you to understand the concepts with real-world scenarios and use cases. This course will help you become a better developer. No prior coding experience is needed to take up this course, just dedication and commitment to learning.
Duration 2.25 Days 13.5 CPD hours This course is intended for nded for individuals who want to gain basic knowledge of working on Microsoft Server Fundamentals 2016 Overview Upon successful completion of this course students will learn the introductory and fundamental functions and services in a Windows Server domain environment. This includes basic Active Directory principles and structures, Windows Firewall basics and configuration, sharing folders and NTFS permissions, Hyper-V virtualization fundamentals, NPS and RADIUS fundamentals, Windows Server backup, and introductory Group Policy functions and uses. In this course, students will learn about Active Directory Domain Services, Windows Firewall with Advanced Security, Shared Folders, Virtualization, Network Policy Server, Windows Server Backup and Group Policy. IntroductionActive Directory Domain Services Overview Domains OUs Forest Domain Controllers Windows Firewarll with Advanced Security Firewall Rules and the Firewall Applet Connection Security Rules Shared Folders Shared Folder Ideas and Options Sharing A Folder Permissions Virtualization Hyper-V Ideas Virtual Disks and Switches Virtual Networks and MAC Network Policy Server RADIUS Ideas Window Server Backup Backup options and types Backup performance and advanced settings Group Policy Creation of Group Policy Settings for GPOs Applying GPOs
Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to:Install and configure domain controllers.Manage objects in AD DS by using graphical tools and Windows PowerShell.Implement AD DS in complex environments.Implement AD DS sites, and configure and manage replication.Implement and manage Group Policy Objects (GPOs).Manage user settings by using GPOs.Secure AD DS and user accounts.Implement and manage a certificate authority (CA) hierarchy with AD CS.Deploy and manage certificates.Implement and administer AD FS.Implement and administer Active Directory Rights Management Services (AD RMS).Implement synchronization between AD DS and Azure AD.Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS
Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files
The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. Who is this course for? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00
Description: The Secretarial, PA & Office Administration Diploma course is designed for the people who want to exceed their role as a secretary, PA or office administrator. The responsibilities of a secretary, PA or office administrator require several skills. Throughout the course, you will explore all the essential skills for becoming an efficient secretary or PA. Focuses will be given on how to take notes, using right tools, negotiation skill, communication skill, soft skills, time & meeting management, and more. Fundamental lessons regarding how to use Microsoft Office, Excel, Access and Powerpoint will also be presented to you. Who is the course for? This course is ideal for those wanting to improve their base skills in office administrative tasks This course would be ideal people who want to start working as a receptionist, office administrator, office manager, administration assistant or secretary Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: Secretarial, PA & Office Administration Diploma is a useful qualification to possess and would be beneficial for any professions or career from any industry you are in such as: Administrator support staff Administrative assistant Office managers Receptionist Office administrator Secretarial Interpersonal Skills Module One - Getting Started 00:30:00 Module Two - Verbal Communication Skills 01:00:00 Module Three - Non-Verbal Communication Skills 01:00:00 Module Four - Making Small Talk and Moving Beyond 01:00:00 Module Five - Moving the Conversation Along 00:30:00 Module Six - Remembering Names 01:00:00 Module Seven - Influencing Skills 01:00:00 Module Eight - Bringing People to Your Side 01:00:00 Module Nine - Sharing Your Opinion 01:00:00 Module Ten - Negotiation Basics 01:00:00 Module Eleven - Making an Impact 01:00:00 Module Twelve - Wrapping Up 00:30:00 Developing Interpersonal Skills Course- Activities 00:00:00 Personal Assistant Module One - Getting Started 00:30:00 Module Two - Working with Your Manager 01:00:00 Module Three - Administrative Soft Skills 01:00:00 Module Four - Effective Time Management 01:00:00 Module Five - Meeting Management 01:00:00 Module Six - Tools of the Trade (I) 01:00:00 Module Seven - Tools of the Trade (II) 01:00:00 Module Eight - Being an Effective Gatekeeper 01:00:00 Module Nine - Organizational Skills 01:00:00 Module Ten - Confidentiality Guidelines 01:00:00 Module Eleven - Special Tasks 01:00:00 Module Twelve - Wrapping Up 00:30:00 Business Writing Module One - Getting Started 00:30:00 Module Two - Working with Words 01:00:00 Module Three - Constructing Sentences 01:00:00 Module Four - Creating Paragraphs 01:00:00 Module Five - Writing Meeting Agendas 01:00:00 Module Six - Writing E-mails 01:00:00 Module Seven - Writing Business Letters 01:00:00 Module Eight - Writing Proposals 01:00:00 Module Nine - Writing Reports 01:00:00 Module Ten - Other Types of Documents 01:00:00 Module Eleven - Proofreading and Finishing 01:00:00 Module Twelve - Wrapping Up 00:30:00 Self Esteem & Confidence Building Module One - Getting Started 01:00:00 Module Two - What Does Self-Confidence Mean To You 01:00:00 Module Three - Obstacles to Our Goals 01:00:00 Module Four - Communication Skills 01:00:00 Module Five - The Importance of Goal Setting 01:00:00 Module Six - Feeling the Part 01:00:00 Module Seven - Looking the Part 01:00:00 Module Eight - Sounding the Part 01:00:00 Module Nine - Powerful Presentations 00:30:00 Module Ten - Coping Techniques 01:00:00 Module Eleven - Dealing with Difficult Behavior 00:30:00 Module Twelve - Wrapping Up 00:15:00 Administrative Management Module One - Getting Started 00:30:00 Module Two - Why Your Office Needs Administrative Procedures 01:00:00 Module Three - Gathering the Right Tools 01:00:00 Module Four - Identifying Procedures to Include 01:00:00 Module Five - Top Five Procedures to Record 01:00:00 Module Six - What to Include in Your Binder (I) 01:00:00 Module Seven - What to Include in Your Binder (II) 01:00:00 Module Eight - Organizing Your Binder 01:00:00 Module Nine - What Not to Include in the Procedure Guide 01:00:00 Module Ten - Share Office Procedure Guide 01:00:00 Module Eleven - Successfully Executing the Guide 01:00:00 Module Twelve - Wrapping Up 00:30:00 Admin Support Module One - Getting Started 00:30:00 Module Two - Getting Organized (I) 01:00:00 Module Three - Getting Organized (II) 01:00:00 Module Four - Managing Time 01:00:00 Module Five - Getting It All Done On Time 01:00:00 Module Six - Special Tasks 01:00:00 Module Seven - Verbal Communication Skills 01:00:00 Module Eight - Non-Verbal Communication Skills 01:00:00 Module Nine - Empowering Yourself 01:00:00 Module Ten - The Team of Two 01:00:00 Module Eleven - Taking Care of Yourself 01:00:00 Module Twelve - Wrapping Up 00:30:00 Organisational Skills Module One - Getting Started 00:30:00 Module Two - Remove the Clutter 01:00:00 Module Three - Prioritize 01:00:00 Module Four - Scheduling Your Time 01:00:00 Module Five - To Do Lists 01:00:00 Module Six - Paper and Paperless Storage 01:00:00 Module Seven - Organization in Your Work Area 01:00:00 Module Eight - Tools to Fight Procrastination 01:00:00 Module Nine - Organizing Your Inbox 01:00:00 Module Ten - Avoid the Causes of Disorganization 01:00:00 Module Eleven - Discipline is the Key to Stay Organized 01:00:00 Module Twelve - Wrapping Up 00:30:00 Office Management Building Your Management Team 01:00:00 Building A Successful Brand 01:00:00 Achieving Quality Through Teamwork 00:30:00 Keys To Staying Motivated 00:30:00 Improve Your Marketing 01:00:00 Provide Top Customer Service 00:30:00 Wrapping Up 00:30:00 Bookkeeping & Payroll Module One - Introduction 00:30:00 Module Two - Basic Terminology 01:00:00 Module Three - Basic Terminology (II) 01:00:00 Module Four - Accounting Methods 01:00:00 Module Five - Keeping Track of Your Business 01:00:00 Module Six - Understanding the Balance Sheet 01:00:00 Module Seven - Other Financial Statements 01:00:00 Module Eight - Payroll Accounting Terminology 01:00:00 Module Nine - End of Period Procedures 01:00:00 Module Ten - Financial Planning, Budgeting and Control 01:00:00 Module Eleven - Auditing 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Word Module One - Getting Started 00:30:00 Module Two - Opening 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Document 01:00:00 Module Five - Basic Editing Tasks 01:00:00 Module Six - Basic Formatting Tasks 01:00:00 Module Seven - Formatting Paragraphs 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Styles 01:00:00 Module Ten - Formatting the Page 01:00:00 Module Eleven - Sharing Your Document 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft PowerPoint Module One - Getting Started 00:30:00 Module Two - Opening PowerPoint 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Presentation 01:00:00 Module Five - Working with Text 01:00:00 Module Six - Formatting Text and Paragraphs 01:00:00 Module Seven - Adding Pictures 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Transitions and Animations 01:00:00 Module Ten - Setting Up Your Slide Show 01:00:00 Module Eleven - Showtime! 01:00:00 Module Twelve - Wrapping Up 00:30:00 PowerPoint Essential Activities 00:00:00 Microsoft Excel Module One - Getting Started 00:30:00 Module Two - Opening Excel 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Worksheet 01:00:00 Module Five - Viewing Excel Data 01:00:00 Module Six - Building Formulas 01:00:00 Module Seven - Using Excel Functions 01:00:00 Module Eight - Using Quick Analysis 01:00:00 Module Nine - Formatting Your Data 01:00:00 Module Ten - Using Styles, Themes, and Effects 01:00:00 Module Eleven - Printing and Sharing Your Workbook 01:00:00 Module Twelve - Wrapping Up 01:00:00 Excel for Newbies - Activities 00:00:00 Mock Exam Mock Exam- Secretarial, PA & Office Administration Diploma 00:30:00 Final Exam Final Exam- Secretarial, PA & Office Administration Diploma 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
PHP Web Development Diploma with MySQL, GitHub, and Heroku: Advanced Level This course shows you how to get SEO clients and grow your digital marketing agency. You will learn the most effective ways to reach out to businesses and offer your SEO services. We will cover proven client acquisition methods such as cold emails, job boards, freelancing sites, and social platforms. You’ll also discover how to use tools and systems to bring in leads on autopilot. Whether you’re just starting or want to scale up, this course gives you the steps to get results. Course Curriculum Introduction To The Course Freelancing - Elance, ODesk, Freelancer Cold Calling Cold Email Tactics and LinkdIn Indeed.com & Job Boards Thumbtack Facebook Contacts Craigslist & YellowPages Direct Mail Rank & Rent with Websites & YouTube Really Useful Tools for Lead Generation Conclusion (Learn more about this online course)
Course Overview This ADHD Awareness course offers a comprehensive understanding of Attention Deficit Hyperactivity Disorder (ADHD) across various life stages and settings. Designed to build both awareness and insight, it explores the characteristics, challenges, and support strategies associated with ADHD. Learners will gain valuable knowledge about the impact of ADHD on family dynamics, education, and care systems, while also examining cognitive approaches and attention-related difficulties. By the end of this course, participants will be able to recognise symptoms, appreciate the importance of early intervention, and understand practical frameworks for supporting individuals with ADHD. Whether you are seeking personal insight, professional development, or a deeper understanding of ADHD, this course equips you with the foundational knowledge needed to make a meaningful difference. With accessible language, real-world relevance, and evidence-based content, this course is an excellent resource for anyone looking to enhance their competence in recognising and addressing ADHD. Course Description The ADHD Awareness course delves into the key aspects of ADHD, providing a structured exploration of how it presents across different age groups and environments. Learners will study the complexities of ADHD in young people and adults, its effects on family life, educational challenges, and methods of parent training. Attention difficulties and cognitive strategies for managing ADHD are thoroughly examined, alongside a focus on the wider organisation of care. The course is designed to offer a rich learning experience that blends theoretical understanding with real-world applications, supported by contemporary research and best practices. Participants will develop the skills necessary to identify symptoms, understand behavioural patterns, and engage with support systems effectively. This course supports both personal enrichment and professional advancement by equipping learners with a deep and balanced understanding of ADHD and its management across different contexts. Course Modules Module 01: Introduction to ADHD Module 02: ADHD in Young and Adults Module 03: ADHD in Family Settings Module 04: ADHD in Educational Settings and Parent Training Module 05: ADHD and Attention Difficulties Module 06: Cognitive Approaches in ADHD Module 07: The Organisation of Care for ADHD (See full curriculum) Who is this course for? Individuals seeking to understand ADHD and its effects on daily life. Professionals aiming to enhance their expertise in supporting individuals with ADHD. Beginners with an interest in psychology, education, or social care. Parents, guardians, and caregivers wanting to develop supportive strategies. Educators and teaching assistants looking to broaden their knowledge of ADHD in learning environments. Health and social care workers aiming to improve service provision for ADHD. Career Path Special Educational Needs (SEN) Support Worker ADHD Support Specialist Educational Psychologist Assistant Family Support Worker Behavioural Support Officer Health and Social Care Assistant Teaching Assistant specialising in ADHD Youth and Community Worker