• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

222 XML courses

Selenium WebDriver 4 with Java - Zero To Hero

By Packt

This course will teach you how Selenium WebDriver is used to test web applications. You will start by understanding the concepts of Java and gradually move toward understanding Selenium, TestNG framework, Maven, Jenkins, Cucumber, Gherkin, and a lot more interesting topics that will make you a pro in automation testing.

Selenium WebDriver 4 with Java - Zero To Hero
Delivered Online On Demand38 hours 52 minutes
£149.99

Ethical Hacking with Kali Linux

5.0(10)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Excel 2007 Simplified

By iStudy UK

Description This course is aimed at the excel user who already knows the basics of Excel 2007. This course will help you to go beyond the basics - to reach a higher-intermediate level. With shortcuts, tricks and tips - you will be able to work smarter and faster. If you want to be fairly competent on the software, then this course will be very handy. Its a lot quicker to be shown things, then to try and muddle through and work things out by yourself. Guaranteed, there'll be some items which we cover, that you have no idea that Excel was capable of doing! We don't want you to spend a day of your life in the classroom... learn 99 quick and very useful, practical things which you can apply on your job or on your projects. We'll cover: Working with Data - using series, symbols and special characters, hide rows and freeze panels Formulas and Functions - Calculate the duration between two dates/times, best loan terms, create conditional formula and conditional sums Copying Data - transposing rows into columns and paste specials Using Excel lists - sort and filter a list, remove duplicate records, count filtered records, look up information in a list Data Patterns - Pivot tables, pivot charts, what-if analysis Creating charts - histogram, trendlines, piecharts, error bars Presenting data - formatting columns and numbers Saving and printing worksheets - printing multiple worksheets, area, cell ranges, repeat headings of a row or column Extending excel - hyperlinks, embed a chart, importing a worksheet Customizing Excel - custom workspace, custom view, macros The target audience is those who have a basic level with Excel and want to learn other handy functions and features. We use Excel 2007 only in this course. If you have Excel 2003, this course will be difficult to follow as although the functions and features exist in 2003, the layout changed very dramatically between the two versions. Excel 2007 isn't too dissimilar from 2010. Where necessary, we provide a spreadsheet - but as long as you have Excel 2007, you'll be able to copy and do exactly what you see on the screen by pausing the video and following along. The course will take approx 7.5 hours to complete. Take this course if you want to take your basic understanding of Excel to a higher intermediate-level. What Will I Learn? Work with Formulas and Functions Copy data and formats Use excel lists Create charts Present worksheets nicely Save and print worksheets Who is the target audience? This is for those who are beginners in Excel and want to take it further to higher intermediate level - using Excel 2007 You should know the 'basics' in Excel and we take it from near-beginner, to higher intermediate Requirements Students will need to have Excel 2007 installed, as this is the system used in the teaching Introduction to the course and your tutor Data Enter numbers and fractions 00:05:00 Dates and Times 00:08:00 Name Cells and Ranges 00:04:00 Validate Data entry using a pick list FREE 00:07:00 Extend a series of dates with autofill 00:04:00 Add a symbol or special character 00:04:00 Compare multiple spreadsheets using freeze panels 00:06:00 Hide rows 00:04:00 Keyboard 00:10:00 Speak Cells 00:04:00 Find and replace data 00:10:00 Formulas and Functions Add values 00:03:00 Function wizard 00:06:00 Formulas with comments 00:04:00 OneNote 00:06:00 Define a constant 00:04:00 Apply names in functions 00:05:00 Figure out the best loan terms 00:04:00 Internal Rates of Return 00:04:00 Nth largest value 00:04:00 Large, Small, Max, Min 00:04:00 Conditional formula 00:03:00 Conditional formula with names 00:04:00 Conditional sum 00:03:00 Count If 00:02:00 Inner calculator 00:02:00 Square Roots 00:03:00 Calculate the duration between two times 00:04:00 Calculate days between two dates 00:04:00 Copying Data, Formats etc., Copy a range 00:03:00 Transpose a row into a column FREE 00:02:00 Chart formatting 00:07:00 Copy styles to another workbook 00:07:00 Paste special and copying worksheets 00:06:00 Track changes while Editing 00:06:00 Lists Enter list data using a form 00:05:00 Searching through a data list 00:04:00 Import a word list into excel 00:04:00 Sort a list 00:02:00 Filter a list 00:02:00 Sort by multiple criteria FREE 00:03:00 Find averages in a sorted group 00:05:00 Filter by multiple criteria 00:03:00 Remove duplicate records from a list 00:03:00 Count filtered records 00:07:00 Filter by multiple criteria in the same column 00:06:00 Chart a filtered list 00:02:00 Look up information in a List 00:05:00 Data Patterns Create a PivotTable 00:05:00 Modify a PivotTable and layout 00:03:00 Find the average of a field 00:04:00 Create a calculated field 00:03:00 Calculated fields and charts FREE 00:02:00 Hide rows and columns in a PivotTable 00:02:00 AutoFormat a PivotTable 00:01:00 Create a PivotChart 00:03:00 Turning on the Data Analysis function so that statistical information can be run 00:02:00 Describe Data with Statistics 00:03:00 Discover associations within your data 00:03:00 Product Numbers 00:02:00 What-if analysis 00:05:00 Goal seek 00:06:00 Creating Charts Create a Chart 00:06:00 Modify Chart details 00:04:00 Change the Chart Type 00:03:00 Add a Trendline to a Chart 00:06:00 Remove Chart Data 00:02:00 Add chart data 00:02:00 Missing chart data 00:04:00 Error bars 00:04:00 Pull a slice from a Pie Chart 00:03:00 Label slices of a Pie Chart 00:04:00 Histogram 00:06:00 Paste a chart into Word 00:03:00 Amending a chart in Word 00:02:00 Paste-link a Chart into Word 00:05:00 Worksheets Format Numbers as Percentages 00:04:00 Format Currencies in Currency and Accounting Formats 00:03:00 Format Column Headings 00:05:00 Format Quickly with Format painter FREE 00:02:00 Insert a background image into your worksheet 00:03:00 Create a Transparent image 00:03:00 Saving and Printing Worksheets Save a workbook as a Template 00:07:00 Save a workbook as an XML spreadsheet 00:05:00 Print multiple cell ranges on One Page 00:03:00 Print multiple worksheets of a workbook 00:01:00 Page set up, header, footer, margins - 1 page printing 00:04:00 Repeat Headings of a Row or Column 00:07:00 Print functions to show calculations & comments 00:07:00 Extending Excel Hyperlink a worksheet to another office document 00:03:00 Embed a chart within PowerPoint 00:05:00 Publish an Interactive Workbook 00:05:00 Import a Worksheet into Access 00:09:00 Use Excel Data to create labels in Word 00:10:00 Customizing Excel Launch a specific Workbook when Excel Opens 00:03:00 Save Time by Creating a Custom View 00:03:00 Create a Custom Number Format 00:06:00 Changing Text to Columns 00:05:00 Create a Macro to Format Numbers 00:06:00 Online Live Webinar Course-S3_W4_L1 - 42 - Excel Made simple 01:00:00

Excel 2007 Simplified
Delivered Online On Demand8 hours 4 minutes
£25

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme Gain a comprehensive understanding of ethical hacking. Strengthen your skills and knowledge required to become an ethical hacker. Understand the basic Linux commands. Learn to create a secure hacking environment. Gain knowledge about scanning, footprinting and website penetration testing. Understand the process of wireless cracking. Learn about the man in the middle attacks. Learn about system hacking with Metasploit. Understand the basic authentication brute force. Why Ethical Hacking Complete Course right for you? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. Ethical Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction Introduction to The Course VirtualBox Installation Kali Linux Installation Enabling Full-Screen Basic Linux Commands Basic Commands Part 1 Basic Commands Part 2 Basic Commands Part 3 Creating a Secure Hacking Environment Changing IP Address and Wireless Adapter Setup Creating a Bootable Kali USB Drive Essential Networking Terms Essential Hacking Terms Additional Kali Tools to Install Changing Our MAC Address with Macchanger Footprinting Google Hacking Nikto Basics Whois Tool Email Harvesting Shodan Zone Transfer with Dig Scanning Installing Metasploitable Nmap Part 1 Nmap Part 2 Nmap Part 3 Zenmap TCP Scans Nmap Bypassing Defenses Nmap Scripts Part 1 Nmap Scripts Part 2 Website Penetration Testing Installing OWASP HTTP Request HTTP Response Burpsuite Configuration Editing Packets in Burpsuite Whatweb and Dirb Password Recovery Attack Burpsuite Login Bruteforce Hydra Login Bruteforce Session Fixation Injection Attacks Simple Command Injection Exploiting Command Injection Vulnerability Finding Blind Command Injection SQL Basics Manual SQL Injection Part 1 Manual SQL Injection Part 2 SQLmap Basics XML Injection Installing XCAT And Preventing Injection Attacks Reflected XSS Stored XSS Changing HTML Code with XSS XSSer and XSSsniper Wireless Cracking Wireless Attacking Theory Enabling Monitor Mode Capturing Handshake with Airodump RockYou.txt Cracking with Aircrack Cracking with Hashcat Creating Password Lists with Crunch Creating Password Lists with Cupp Rainbow Tables Part 1 Rainbow Tables Part 2 Installing Fluxion Finding and Cracking Hidden Networks Preventing Wireless Attacks Man in the Middle Attacks ARP Protocol Basics Man in The Middle Attack Theory Installing MITMf Manual ARP Spoofing Problems While Installing MITMf HTTP Traffic Sniffing DNS Spoofing and HTTPS Password Sniffing Hooking Browsers with BEEF Screenshotting Targets Browser Cloning Any Webpage Ettercap Basics System Hacking with Metasploit MSFconsole Environment Bruteforcing SSH with Metasploit Attacking Tomcat with Metasploit Getting Meterpreter with Command Injection PHP Code Injection 2 Metasploitable Exploits Wine Installation Creating Windows Payloads with Msfvenom Encoders and Hex Editor Windows 10 Meterpreter Shell Meterpreter Environment Windows 10 Privilege Escalation Preventing Privilege Escalation Post Exploitation Modules Getting Meterpreter Over Internet with Port Forwarding Eternalblue Exploit Persistence Module Hacking Over The Internet with Ngrok Android Device Attack with Venom The Real Hacking Begins Now! Python Crash Course Variables Raw Input If-Else Statements For Loops While Loops Python Lists Functions Classes Importing Libraries Files in Python Try and Except Rule Coding an Advanced Backdoor Theory Behind Reverse Shells Simple Server Code Connection with Reverse Shell Sending and Receiving Messages Sending Messages with While True Loop Executing Commands on Target System Fixing Backdoor Bugs and Adding Functions First Test Using Our Backdoor Trying to Connect Every 20 Seconds Creating Persistence Part 1 Creating Persistence Part 2 Changing Directory Uploading and Downloading Files Downloading Files from The Internet Starting Programs Using Our Backdoor Capturing Screenshot on The Target PC Embedding Backdoor in an Image Part 1 Embedding Backdoor in an Image Part 2 Checking for Administrator Privileges Adding Help Option Creating a Keylogger for The Backdoor Importing Pynput Simple Keylogger Adding Report Function Writing Keystrokes to a File Adding The Keylogger to Our Reverse Shell Part 1 Adding The Keylogger to Our Reverse Shell Part 2 Final Project Test Basic Authentication Bruteforcer Printing Banner Adding Available Options Starting Threads for Bruteforce Writing Function to Run The Attack Bruteforcing Router Login Bypassing Antivirus with Your Future Programs Sending Malware with Spoofed Email Bonus - Building a Career in Cyber Security What will You Learn in This Section? Why is Ethical Hacking a Valuable Skill? What is The Best Ethical Hacking Certification? Tips for Getting Your First Job As an Ethical Hacker How I Started My Career As an Ethical Hacker How to Price Your Work Who should take this course? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. Entry Requirements There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25

Microsoft Office 2016 Advanced

5.0(1)

By Course Gate

Microsoft office is used for documentation, writing, and many other activities. It brings a new dimension to this technology-based competitive world. It has vivid functions and much more use. If you want to learn all its advanced functions, look at our Microsoft Office 2016 Advanced course. This course introduces to the function of ribbon that incorporates many tabs such as Insert, design, animation, slides, show, review, and home. It also guides you step by step how to insert a picture, change design lay order, add a hyperlink, watch video from youtube, create CV, cash memo, payment sleep, many more things. Overall the course teaches you all the efficient use of Microsoft Office to be expert in it. Who is this Course for? Microsoft Office 2016 Advanced is perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Microsoft Word 2016 Modify User Information 00:15:00 Share a Document 00:30:00 Work with Comments 00:15:00 Compare Document Changes 00:15:00 Review a Document 00:15:00 Merge Document Changes 00:15:00 Coauthor Documents 00:15:00 Add Captions 00:15:00 Add Cross-References 00:15:00 Add Bookmarks 00:15:00 Add Hyperlinks 00:15:00 Insert Footnotes and Endnotes 00:15:00 Add Citations 00:30:00 Insert a Bibliography 00:15:00 Insert Blank and Cover Pages 00:15:00 Insert an Index 00:30:00 Insert a Table of Contents 00:30:00 Insert an Ancillary Table 00:15:00 Manage Outlines 00:30:00 Create a Master Document 00:30:00 Suppress Information 00:30:00 Set Editing Restrictions 00:30:00 Add a Digital Signature to a Document 00:15:00 Restrict Document Access 00:15:00 Create Forms 00:30:00 Manipulate Forms 00:15:00 Form Data Conversion 00:15:00 Create a New Document Version 00:30:00 Compare Document Versions 00:15:00 Merge Document Versions 00:15:00 Activities - Microsoft Word 2016 Advanced 00:00:00 Microsoft Excel 2016 Update Workbook Properties 00:15:00 Activity-Update Workbook Properties 00:05:00 Create and Edit a Macro 00:15:00 Activity-Create and Edit a Macro 00:05:00 Apply Conditional Formatting 00:15:00 Activity-Apply Conditional Formatting 00:05:00 Add Data Validation Criteria 00:15:00 Activity-Add Data Validation Criteriaty 00:05:00 Trace Cells 00:15:00 Activity-Trace Cells 00:05:00 Troubleshoot Invalid Data and Formula Errors 00:15:00 Activity-Troubleshoot Invalid Data and Formula Errors 00:05:00 Watch and Evaluate Formulas 00:15:00 Activity-Watch and Evaluate Formulas 00:05:00 Create a Data List Outline 00:15:00 Activity-Create a Data List Outline 00:05:00 Create Sparklines 00:15:00 Activity_Create Sparklines 00:05:00 Create Scenarios 00:15:00 Activity-Create Scenarios 00:05:00 Perform a What-If Analysis 00:15:00 Activity-Perform a What-If Analysis 00:05:00 Perform a Statistical Analysis with the Analysis ToolPak 00:15:00 Activity-Perform a Statistical Analysis with the Analysis ToolPak 00:05:00 Create Interactive Data with Power View 00:15:00 Activity-Create Interactive Data with Power View 00:05:00 Consolidate Data 00:15:00 Activity-Consolidate Data 00:05:00 Link Cells in Different Workbooks 00:15:00 Activity-Link Cells in Different Workbooks 00:05:00 Merge Workbooks 00:15:00 Activity-Merge Workbooks 00:05:00 Export Excel Data 00:15:00 Activity-Export Excel Data 00:05:00 Import a Delimited Text File 00:14:00 Activity- Import a Delimited Text File 00:05:00 Integrate Excel Data with the Web 00:15:00 Activity-Integrate Excel Data with the Web 00:05:00 Create a Web Query 00:15:00 Activity-Create a Web Query 00:05:00 Import and Export XML Data 00:15:00 Activity-Import and Export XML Data 00:05:00 Activities and Exercise Files - Microsoft Excel 2016 Advanced 00:00:00 Microsoft PowerPoint 2016 Customize the User Interface 01:30:00 Set PowerPoint 2016 Options 00:45:00 Create and Manage Sections 01:00:00 Modify Slide Masters and Slide Layouts 01:15:00 Add Headers and Footers 00:30:00 Modify the Notes Master and the Handout Master 00:45:00 Create SmartArt 00:45:00 Modify SmartArt 01:00:00 Add Audio to a Presentation 00:45:00 Add Video to a Presentation 01:00:00 Customize Animations and Transitions 01:00:00 Add Comments to a Presentation 00:45:00 Review a Presentation 00:45:00 Store and Share Presentations on the Web 01:30:00 Annotate a Presentation 00:45:00 Set Up a Slide Show 00:45:00 Create a Custom Slide Show 00:30:00 Add Hyperlinks and Action Buttons 00:45:00 Record a Presentation 00:15:00 Secure a Presentation 01:30:00 Present a Slide Show Online 01:00:00 Create a Video or a CD 00:45:00 Activities - Microsoft PowerPoint 2016 Advanced 00:00:00 Microsoft Outlook 2016 Insert Advanced Characters and Objects 01:30:00 Modify Message Settings, Properties, and Options 01:30:00 Use Automatic Replies 01:30:00 Sort Messages 00:45:00 Filter Messages 01:00:00 Organize Messages 02:00:00 Search Messages 01:30:00 Manage Junk Mail 01:00:00 Manage Your Mailbox 02:00:00 Manage Advanced Calendar Options 00:45:00 Manage Additional Calendars 01:00:00 Manage Meeting Responses 00:45:00 Assign and Manage Tasks 01:00:00 Edit an Electronic Business Card 01:00:00 Manage Advanced Contact Options 01:30:00 Forward Contacts 00:30:00 Export Contacts 01:00:00 Delegate Access to Mail Folders 01:00:00 Share Your Calendar 00:30:00 Share Your Contacts 00:15:00 Back Up Outlook Items 00:45:00 Change Data File Settings 00:45:00 Configure E-mail Message Security Settings 00:30:00 Activities - Microsoft Outlook 2016 Advanced 00:00:00 Microsoft Access 2016 Add Controls to Forms 01:00:00 Set Form Controls 01:00:00 Create Subforms 00:30:00 Organize Information with Tab Pages 00:30:00 Enhance Navigation with Forms 00:30:00 Format a Form 01:00:00 Apply Conditional Formatting 00:30:00 Field Validation 00:30:00 Form and Record Validation 00:30:00 Create a Macro 01:00:00 Restrict Records Using a Condition 00:30:00 Validate Data Using a Macro 00:30:00 Automate Data Entry Using a Macro 00:30:00 Convert a Macro to VBA 00:30:00 Link Tables to External Data Sources 00:30:00 Manage a Database 00:30:00 Determine Object Dependency 00:30:00 Document a Database 00:30:00 Analyze the Performance of a Database 00:30:00 Split a Database for Multiple User Access 00:30:00 Implement Security 00:30:00 Set Passwords 00:30:00 Convert an Access Database to an ACCDE File 00:30:00 Package a Database with a Digital Signature 00:30:00 Create a Database Switchboard 01:00:00 Modify a Database Switchboard 00:30:00 Set Startup Options 00:30:00 Mock Exam Mock Exam - Microsoft Office 2016 Advanced 00:20:00 Final Exam Final Exam - Microsoft Office 2016 Advanced 00:20:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Microsoft Office 2016 Advanced
Delivered Online On Demand3 days
£11.99

SEO Masterclass

5.0(1)

By Course Gate

In this competitive job market, you need to have some specific skills and knowledge to start your career and establish your position. This SEO Masterclass will help you understand the current demands, trends and skills in the sector. The course will provide you with the essential skills you need to boost your career growth in no time. The SEO Masterclass will give you clear insight and understanding about your roles and responsibilities, job perspective and future opportunities in this field. You will be familiarised with various actionable techniques, career mindset, regulations and how to work efficiently. This course is designed to provide an introduction to SEO Masterclass and offers an excellent way to gain the vital skills and confidence to work toward a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Learning Objectives Learn the fundamental skills you require to be an expert Explore different techniques used by professionals Find out the relevant job skills & knowledge to excel in this profession Get a clear understanding of the job market and current demand Update your skills and fill any knowledge gap to compete in the relevant industry CPD accreditation for proof of acquired skills and knowledge Who is this Course for? Whether you are a beginner or an existing practitioner, our CPD accredited SEO Masterclass is perfect for you to gain extensive knowledge about different aspects of the relevant industry to hone your skill further. It is also great for working professionals who have acquired practical experience but require theoretical knowledge with a credential to support their skill, as we offer CPD accredited certification to boost up your resume and promotion prospects. Entry Requirement Anyone interested in learning more about this subject should take this SEO Masterclass. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. The course is open to students from any academic background, as there is no prerequisites to enrol on this course. The course materials are accessible from an internet enabled device at anytime of the day. CPD Certificate from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path The SEO Masterclass will help you to enhance your knowledge and skill in this sector. After accomplishing this course, you will enrich and improve yourself and brighten up your career in the relevant job market. Course Curriculum Section 01: SEO & Inbound Marketing Become a Master of Search Engine Optimization and Inbound Marketing Today 00:05:00 Transcending keywords and link building with a mindset of serving viewers and solving 00:10:00 How I get 2 5+ million impressions a month on Google and YouTube 00:19:00 How To Get 1,000 Clicks A Day From Google Organic Search 00:15:00 Top 25 SEO Tips for 2020! 00:23:00 Worst SEO strategies I have confirmed are terrible 00:11:00 Section 02: Building Connections Aiming for Lifetime Connections 00:07:00 Where to start Fix and improve what we see! 00:06:00 Play nice with others! Haters and competitors are friends! 00:08:00 Tutorials build a rock solid foundation 00:04:00 Entertain to keep people coming back and have fun 00:07:00 Stories stick with us 00:06:00 Long videos, posts, and descriptions ideal like Wikipedia 00:05:00 Section 03: Hosting and Optimization Scalable web host makes viral growth possible and high ranking easier 00:13:00 Email marketing helps build relationships and links naturally 00:12:00 Word Press Plug-in Setup + Best Dashboard Performance Settings 00:20:00 HTTPS is included as a ranking factor in Google 00:01:00 Ensure complete coverage of your own name in search results 00:05:00 Register your domain for a long time to show stability over time 00:04:00 Edit the date published when making any changes 00:02:00 Setup automatic sharing on social media to help get viewers 00:04:00 Section 04: Google Analytics Insights Google analytics introduction for beginners 00:04:00 Google analytics admin dashboard for account and property creation plus Ad Words link 00:07:00 Google analytics home dashboard from users, sessions, channel, and device 00:12:00 Site speed and suggestions to improve user experience and rank higher 00:09:00 Behaviour tab with all pages to see where more traffic is 00:05:00 Acquisition source medium and referrals for understanding how we get traffic 00:10:00 Conversion tracking and advanced features 00:04:00 Section 05: Google Webmaster Tools and Search Console Google webmaster tools settings to become a verified owner 00:03:00 New Google search console overview 00:04:00 Submit a Word Press XML sitemap fast with Yoast SEO plugin 00:03:00 Performance reports for queries, pages, countries, and devices 00:10:00 Welcome to the top! 00:03:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

SEO Masterclass
Delivered Online On Demand4 hours 21 minutes
£11.99

Web Development Concepts for Everyone

By Packt

This is a comprehensive course designed to provide a solid foundation in web development principles and practices. This course is intentionally structured to provide a technical understanding of web development concepts without delving into intricate implementation details. Anyone looking to better understand how web applications are built can take this course.

Web Development Concepts for Everyone
Delivered Online On Demand5 hours
£82.99

Master Microservices with Spring Boot and Spring Cloud

By Packt

Learn to build an amazing REST API with Spring Boot and understand what all this hype about microservices is about.

Master Microservices with Spring Boot and Spring Cloud
Delivered Online On Demand19 hours 39 minutes
£37.99

Nessus Scanner - Network Scanning from Beginner to Advanced

By Packt

Become a vulnerability assessment professional with the Nessus scanner for networks and learn to analyze and rank vulnerabilities, both manually and through automation. Explore vulnerability scanning with Metasploit and write custom professional reports. Learn to import results of Nmap in Nessus and create VA Project Worksheets to analyze vulnerability assessments.

Nessus Scanner - Network Scanning from Beginner to Advanced
Delivered Online On Demand5 hours 54 minutes
£82.99

Ethical Hacking Masterclass

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 28 Hours 44 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about ethical hacking and network security Understand the core competencies and principles of ethical hacking and network security Explore the various areas of ethical hacking and network security Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert ethical hacker Ethical Hacking Masterclass Course Master the skills you need to propel your career forward in ethical hacking and network security. This course will equip you with the essential knowledge and skillset that will make you a confident ethical hacker and take your career to the next level. This comprehensive ethical hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this ethical hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective ethical hacking and network security practice and equip you with the essential skills, confidence and competence to assist you in the ethical hacking and network security industry. You'll gain a solid understanding of the core competencies required to drive a successful career in ethical hacking and network security. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for ethical hacker or for people who are aspiring to specialise in ethical hacking and network security. Enrol in this ethical hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive ethical hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this ethical hacking and network security can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This ethical hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This ethical hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This ethical hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction To The Course 00:05:00 VirtualBox Installation 00:16:00 Kali Linux Installation 00:14:00 Enabling Full-Screen 00:18:00 Basic Linux Commands Basic Commands Part 1 00:10:00 Basic Commands Part 2 00:21:00 Basic Commands Part 3 00:13:00 Creating a Secure Hacking Environment Changing IP Address And Wireless Adapter Setup 00:05:00 Creating A Bootable Kali USB Drive 00:05:00 Essential Networking Terms 00:10:00 Essential Hacking Terms 00:18:00 Additional Kali Tools To Install 00:08:00 Changing our MAC Address With Macchanger 00:06:00 Footprinting Google Hacking 00:13:00 Nikto Basics 00:11:00 Whois Tool 00:07:00 Email Harvesting 00:06:00 Shodan 00:10:00 Zone Transfer With Dig 00:07:00 Scanning Installing Metasploitable 00:07:00 Nmap Part 1 00:16:00 Nmap Part 2 00:12:00 Nmap part 3 00:12:00 Zenmap 00:08:00 Nmap Bypassing Defenses 00:17:00 Nmap Bypassing Defenses 00:17:00 Nmap Scripts Part 1 00:09:00 Nmap Scripts Part 2 00:14:00 Website Penetration Testing Installing OWASP 00:08:00 HTTP Request 00:10:00 HTTP Response 00:10:00 Burpsuite Configuration 00:13:00 Editing Packets In Burpsuite 00:12:00 Whatweb And Dirb 00:10:00 Password Recovery Attack 00:16:00 Burpsuite Login Bruteforce 00:11:00 Hydra Login Bruteforce 00:09:00 Session Fixation 00:14:00 Injection Attacks 00:06:00 Simple Command Injection 00:11:00 Exploiting Command Injection Vulnerability 00:08:00 Finding Blind Command Injection 00:14:00 SQL Basics 00:10:00 Manual SQL Injection Part 1 00:13:00 Manual SQL Injection Part 2 00:21:00 SQLmap Basics 00:17:00 XML Injection 00:16:00 Installing XCAT And Preventing Injection Attacks 00:06:00 Reflected XSS 00:11:00 Stored XSS 00:12:00 Changing HTML Code With XSS 00:07:00 XSSer And XSSsniper 00:14:00 Wireless Cracking Wireless Attacking Theory 00:11:00 Enabling Monitor Mode 00:05:00 Capturing Handshake With Airodump 00:15:00 RockYou.txt 00:14:00 Cracking With Aircrack 00:16:00 Cracking With Hashcat 00:15:00 Creating Password Lists With Crunch 00:18:00 Creating Password Lists With Cupp 00:07:00 Rainbow Tables Part 1 00:17:00 Rainbow Tables Part 2 00:06:00 Installing Fluxion 00:06:00 Finding And Cracking Hidden Networks 00:08:00 Preventing Wireless Attacks 00:08:00 Man in the Middle Attacks ARP Protocol Basics 00:10:00 Man In The Middle Attack Theory 00:07:00 Installing MITMf 00:07:00 Manual ARP Spoofing 00:13:00 Problems While Installing MITMf 00:06:00 HTTP Traffic Sniffing 00:08:00 DNS Spoofing And HTTPS Password Sniffing 00:24:00 Hooking Browsers With BEEF 00:16:00 Screenshotting Targets Browser 00:11:00 Cloning Any Webpage 00:09:00 Ettercap Basics 00:07:00 System Hacking with Metasploit MSFconsole Environment 00:16:00 Bruteforcing SSH With Metasploit 00:15:00 Attacking Tomcat With Metasploit 00:09:00 Getting Meterpreter With Command Injection 00:25:00 PHP Code Injection 00:06:00 2 Metasploitable Exploits 00:07:00 Wine Installation 00:12:00 Creating Windows Payloads With Msfvenom 00:10:00 Encoders And Hex Editor 00:19:00 Windows 10 Meterpreter Shell 00:12:00 Meterpreter Environment 00:11:00 Windows 10 Privilege Escalation 00:11:00 Preventing Privilege Escalation 00:06:00 Post Exploitation Modules 00:14:00 Getting Meterpreter Over Internet With Port Forwarding 00:11:00 Eternalblue Exploit 00:20:00 Persistence Module 00:13:00 Hacking Over The Internet With Ngrok 00:10:00 Android Device Attack With Venom 00:10:00 Python Crash Course Variables 00:14:00 Raw Input 00:11:00 If-Else Statements 00:10:00 For Loops 00:06:00 While Loops 00:08:00 Python Lists 00:08:00 Functions 00:15:00 Classes 00:10:00 Importing Libraries 00:07:00 Files In Python 00:12:00 Try And Except Rule 00:05:00 Coding an Advanced Backdoor Theory Behind Reverse Shells 00:07:00 Simple Server Code 00:13:00 Connection With Reverse Shell 00:07:00 Sending And Receiving Messages 00:11:00 Sending Messages With While True Loop 00:08:00 Executing Commands On Target System 00:10:00 Fixing Backdoor Bugs And Adding Functions 00:20:00 First test Using Our Backdoor 00:18:00 Trying To Connect Every 20 Seconds 00:12:00 Creating Persistence Part 1 00:06:00 Creating Persistence Part 2 00:17:00 Changing Directory 00:12:00 Uploading And Downloading Files 00:22:00 Downloading Files From The Internet 00:23:00 Starting Programs Using Our Backdoor 00:07:00 Capturing Screenshot On The Target PC 00:19:00 Embedding Backdoor In An Image Part 1 00:13:00 Embedding Backdoor In An Image Part 2 00:09:00 Checking For Administrator Privileges 00:12:00 Adding Help Option 00:09:00 Creating a Keylogger for the Backdoor Importing Pynput 00:10:00 Simple keylogger 00:10:00 Adding Report Function 00:11:00 Writing Keystrokes To A File 00:14:00 Adding The Keylogger To Our Reverse Shell Part 1 00:23:00 Adding The Keylogger To Our Reverse Shell Part 2 00:08:00 Final Project Test 00:14:00 Basic Authentication Bruteforcer Printing Banner 00:11:00 Adding Available Options 00:11:00 Writing Function To Run The Attack 00:11:00 Bruteforcing Router Login 00:10:00 Bypassing Antivirus With Your Future Programs 00:14:00 Sending Malware With Spoofed Email 00:15:00 Bonus - Building a Career in Cyber Security What Will You Learn In This Section 00:03:00 Why Is Ethical Hacking A Valuable Skill 00:23:00 What Is The Best Ethical Hacking Certification 00:17:00 Tips For Getting Your First Job As An Ethical Hacker 00:18:00 How I Started My Career As An Ethical Hacker 00:14:00 How To Price Your Work 00:11:00 Assessment Assessment - Ethical Hacking Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Masterclass
Delivered Online On Demand
£19