• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

489 Courses

Computer Specialist Diploma

4.3(43)

By John Academy

Description: Computer Specialist Diploma Course is intended for those who wants to gain computer skills and knowledge. It has modules which will give you all the ins and outs of operating on a personal computer and its broad applications. First of all, it will cover all the fundamental computing terms, input, output, and storage devices. You will also learn about the operating systems, interface and its applications. As you step up through the hierarchy of the basic to intermediate to expert levels, you will be exposed to several contents which will teach you about networking, internet basic, ergonomics, safeguarding your data from malware, customization, etc. And the end, you will have a profound knowledge about computers. Learning Outcomes: Realise the common computing concepts Figure out the difference between hardware and software, as well as how they work Realise the operations of information networks Be conscious of security measures as well as learn working safely Obtain knowledge of the primary steps of operating a computer, involving using the keyboard,mouse, and Windows desktop Become competent to manage and use files and folders with proficiency Get knowledge of how to implement the fundamental Windows Applications,at the same time, learn Wordpad, Notepad, Task Manager, Calculator, Paint and Internet Explorer. Understand general computing concepts Understand the difference between hardware and software, and how each works Understand how information networks operate Become aware of security concerns and how to work safely Learn the first steps of using a computer, including using the keyboard, mouse, and Windows desktop Be able to effectively manage and use files and folders Learn how to use the basic Windows applications, including WordPad, NotePad, Task Manager, Calculator, Paint, and Internet Explorer Basic computing terms The fundamental computing skills Anatomy of a PC Input, output, and storage devices Operating systems and applications Legal issues, including licensing of software Networking and Internet basics Computers in the workplace Telecommuting and the electronic world Ergonomics, safety, and the environment Being proactive about security Protecting your data Understanding malware Using the mouse, keyboard, and desktop Customizing your computer Printing Understand and using files and folders Basic Windows applications Working with a window Working with applications Browsing the Web Realise the common computing concepts Figure out the difference between hardware and software, and how they function Interpret how information networks work Be alert of security measures as well as how you can work safely Acquire the knowledge of operating the first steps of a computer, learn how to use the keyboard, mouse, as well as Windows desktop Become competent to proficiently handle and apply files and folders Attain knowledge of operating fundamental Windows applications, along with Wordpad, Notepad, Task Manager, Calculator, Paint and Internet Explorer Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Computer Specialist Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Computer Specialist Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module 01 Basic Terms 00:15:00 Types of Computers 00:15:00 Anatomy of a PC 00:30:00 How a PC Works 00:15:00 CPU and Memory 00:30:00 Input Devices 00:15:00 Output Devices 00:15:00 Secondary Storage Devices 00:30:00 The Basics 00:15:00 Operating Systems and Applications 00:30:00 How is Software Built 00:15:00 Types of Software 00:15:00 Legal Issues 00:15:00 Module 02 Basic Terms 00:15:00 Advanced Terms 00:15:00 Networking Basics 00:15:00 Basic Internet Concepts 00:30:00 Internet Security 00:30:00 Computers in the Workplace 00:15:00 Tele-Commuting 00:15:00 The Electronic World 00:15:00 Ergonomics 00:15:00 Safety and the Environment 00:15:00 Being Proactive 00:15:00 Identifying Yourself 00:15:00 Protecting Your Data 01:00:00 Understanding Malware 00:15:00 Protecting Against Malware 00:15:00 Module 03 Application Basics 00:30:00 Basic Applications 01:00:00 Working with a Window 01:00:00 Working with WordPad 01:00:00 Working With Applications 01:00:00 Basics of Web Browsers 01:00:00 Browsing the Web 00:15:00 Working with Bookmarks 01:00:00 Working With Web Pages 01:00:00 Printing Web Pages 01:00:00 Module 04 First Steps 00:30:00 Basic Tasks 01:00:00 Using the Desktop 00:15:00 Customizing Your Computer 00:15:00 Printing 00:15:00 The Basics of Files and Folders 00:10:00 Managing Files and Folders, Part I 01:00:00 Managing Files and Folders, Part II 00:15:00 Viewing File or Folder Properties 00:30:00 Working With Files and Folders 00:30:00 Compressed Files 00:05:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Computer Specialist Diploma
Delivered Online On Demand22 hours 45 minutes
£22

Microsoft Office Essentials

4.3(43)

By John Academy

Description:  Microsoft Office includes Access, Excel, Outlook, Power Point, Publisher and Word. The most widely used version is the desktop version. These versions are available on different operating systems. Through this course, you will learn the necessary skills, knowledge, and information about Microsoft Office. You will know the different components and parts of Microsoft Office that you need to learn to be able to utilise the programs. You will realise that you will not be able to work without it since it is very user-friendly and helpful in your career. Who is the course for? New staff or professionals who want to learn about the Microsoft Office Essentials People who have an interest in the basics and features of Microsoft Office Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Microsoft Office Essentials course is a useful qualification to possess and would be beneficial for any type of professions or careers like: Account Manager Administrative Assistant Executive Assistant Office Administrator Office Manager Personal Assistant Secretary Supervisor Top Executive. Microsoft Word Module One - Getting Started 00:30:00 Module Two - Opening 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Document 01:00:00 Module Five - Basic Editing Tasks 01:00:00 Module Six - Basic Formatting Tasks 01:00:00 Module Seven - Formatting Paragraphs 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Styles 01:00:00 Module Ten - Formatting the Page 01:00:00 Module Eleven - Sharing Your Document 01:00:00 Module Twelve - Wrapping Up 00:30:00 Word for Newbies - Activities 00:00:00 Microsoft Excel Module One - Getting Started 00:30:00 Module Two - Opening Excel 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Worksheet 01:00:00 Module Five - Viewing Excel Data 01:00:00 Module Six - Building Formulas 01:00:00 Module Seven - Using Excel Functions 01:00:00 Module Eight - Using Quick Analysis 01:00:00 Module Nine - Formatting Your Data 01:00:00 Module Ten - Using Styles, Themes, and Effects 01:00:00 Module Eleven - Printing and Sharing Your Workbook 01:00:00 Module Twelve - Wrapping Up 01:00:00 Excel for Newbies - Activities 00:00:00 Microsoft PowerPoint Module One - Getting Started 00:30:00 Module Two - Opening PowerPoint 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Presentation 01:00:00 Module Five - Working with Text 01:00:00 Module Six - Formatting Text and Paragraphs 01:00:00 Module Seven - Adding Pictures 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Transitions and Animations 01:00:00 Module Ten - Setting Up Your Slide Show 01:00:00 Module Eleven - Showtime! 01:00:00 Module Twelve - Wrapping Up 00:30:00 PowerPoint Essential Activities 00:00:00 Microsoft Access Module One - Getting Started 00:30:00 Module Two - Opening and Closing Access 01:00:00 Module Three - An Introduction to Databases 01:00:00 Module Four - Sharing Data Using Apps 01:00:00 Module Five - Working in Your App 01:00:00 Module Six - An Introduction to Desktop Databases 01:00:00 Module Seven - Performing Basic Table Tasks 01:00:00 Module Eight - Working with Fields 01:00:00 Module Nine - Working with Table Relationships 01:00:00 Module Ten - An Introduction to Queries, Forms, and Reports 01:00:00 Module Eleven - Protecting Your Data 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities - Microsoft Access for Beginners 00:00:00 Microsoft Outlook Module One - Getting Started 00:30:00 Module Two - Opening and Closing Outlook 01:00:00 Module Three - Understanding the Interface 01:00:00 Module Four - Working with the Message List and the Reading Pane 01:00:00 Module Five - Using Message List Commands 01:00:00 Module Six - Creating a New Email 01:00:00 Module Seven - Managing Email 01:00:00 Module Eight - Searching for Items 01:00:00 Module Nine - An Introduction to the Calendar 01:00:00 Module Ten - An Introduction to Tasks 01:00:00 Module Eleven - An Introduction to Contact 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities - Microsoft Outlook for Beginners 00:00:00 Microsoft Publisher Module One - Getting Started 00:30:00 Module Two - Opening Publisher 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Publication 01:00:00 Module Five - Working with Pictures 01:00:00 Module Six - Basic Editing Tasks 01:00:00 Module Seven - Formatting Fonts 01:00:00 Module Eight - Formatting Paragraphs 01:00:00 Module Nine - Working with Objects 01:00:00 Module Ten - Working with Pages 01:00:00 Module Eleven - Publishing Your Work 01:00:00 Module Twelve - Wrapping Up 00:30:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Microsoft Office Essentials 00:30:00 Final Exam Final Exam- Microsoft Office Essentials 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Office Essentials
Delivered Online On Demand48 hours
£25

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

Windows 10 Jumpstart: A Beginner's Guide

By Compete High

🚀 Windows 10 Jumpstart: A Beginner's Guide 🚀 Are you ready to embark on a journey to master the most powerful and user-friendly operating system on the planet? Look no further! Introducing our groundbreaking online course: Windows 10 Jumpstart: A Beginner's Guide.   🔍 Unlock the Secrets of Windows 10: Dive headfirst into the Windows 10 universe with confidence! Our comprehensive course is designed for beginners, guiding you through every aspect of this dynamic operating system. Whether you're a complete novice or looking to enhance your skills, this course is your gateway to Windows 10 mastery.   🛠️ What You'll Learn: Getting Started: Navigate the Windows 10 interface effortlessly, from the Start Menu to the Desktop and beyond. Customization: Tailor Windows 10 to fit your needs with personalized settings, themes, and desktop configurations. Productivity Hacks: Unleash the full potential of Windows 10 with time-saving tips, keyboard shortcuts, and efficient multitasking techniques. Security Mastery: Safeguard your digital world with in-depth lessons on Windows Defender, firewalls, and essential security protocols. Troubleshooting Basics: Learn how to tackle common issues and optimize your system for peak performance.   🎓 Why Choose Our Course? Beginner-Friendly: No tech-speak here! We break down complex concepts into easy-to-understand lessons suitable for everyone. Interactive Learning: Engage with hands-on activities, quizzes, and practical exercises to reinforce your newfound knowledge. Lifetime Access: Enjoy unlimited access to the course material, allowing you to learn at your own pace and revisit lessons whenever you need a refresher. Expert Instructors: Our seasoned instructors are passionate about empowering you with the skills you need to navigate Windows 10 like a pro.   💡 Don't Miss Out on This Opportunity to Master Windows 10! Whether you're a student, professional, or tech enthusiast, Windows 10 Jumpstart: A Beginner's Guide is your ticket to unlocking the full potential of your computer. Enroll today and embark on a transformative learning experience! Course Curriculum Basic Overview 00:00 File Explorer File Menu 00:00 File Explorer - File Menu - Part 2 00:00 File Explorer Home Menu 00:00 File Explorer - Share Menu 00:00 File Explorer - View Menu 00:00 File Explorer View Menu 00:00 File Explorer Search Menu 00:00 Managing Your Desktop 00:00 Managing Your Display 00:00 Managing Cortana - Voice Assist 00:00 Quick Assist Settings 00:00 Media Streaming Settings 00:00 Recording A Screen Video 00:00 Recording An Audio 00:00 Taking A Snapshot of Your Screen 00:00 Recording Your Steps 00:00 Capturing Webcam Video 00:00 Adding Applications 00:00 Conclusion 00:00 Advanced Overview 00:00 Managing Start Up Speed 00:00 Managing Open Applications 00:00 Managing Your Hard Drive Space 00:00 Manaing Your Hard Drive Space - Storage Sense 00:00 Managing Frozen Applications 00:00 Managing Your PC Remotely 00:00 Manaing Your PC Remotely - Part 2 00:00 Managing Desktop Notifications - Focus Assist 00:00 Linking Your Mobile Device 00:00 Managing Your Backups and Restore Points 00:00 Managing Your Default Applications 00:00 Managing Your Workspace 00:00 Microsoft Edge - Write Notes 00:00 Managing Edge - Dot Menu 00:00 Managing Edge - Settings Menu Link 00:00 Managing Edge With Cortana 00:00 Managing Default Applications with Edge 00:00 Managing Lost Windows 00:00 Conclusion - Managing Voice Recognition 00:00

Windows 10 Jumpstart: A Beginner's Guide
Delivered Online On Demand1 hour 22 minutes
£25

Microsoft Windows 7 Basic - Video Training Course

4.3(43)

By John Academy

Description: This Microsoft Windows 7 Basic - Video Training Course has been designed to help you understand what an operating system is and help you get accustomed to the Windows 7 environment at a basic level. The other topics include file organization and management, printers and devices, file protection and troubleshooting, the new features of Internet Explorer 8. Windows 7 has been a strong point for Microsoft's operating system line. Its interface has been appealing and user-friendly to the users. This course starts off with an introduction to the features of the OS interface and your ability to customize it for your needs. It has a very organized system of managing records of your files, libraries, and content. The OS keeps good communication with your device and keeps your files safe with the use of Windows Defender. These new features training will surely help you to get accustomed to Windows 7. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Windows 7 Basic - Video Training Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Windows 7 Basic - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Windows 7 Environment The Windows 7 Desktop FREE 00:13:00 The Taskbar and Start Menu 00:01:00 Window Management 00:11:00 Windows Help and Support 00:04:00 Files, Folders, and Libraries Folders and Libraries 00:08:00 Working with Files 00:06:00 Managing Content Working with Windows Explorer 00:04:00 Searching for Content 00:02:00 Customizing the Environment Icons and Shortcuts 00:05:00 Gadgets 00:02:00 System Settings 00:06:00 Internet Explorer 8 Web Browsing 00:09:00 Tabbed Browsing 00:02:00 Web Searching 00:02:00 Customization 00:01:00 Multimedia Content 00:01:00 Mock Exam Mock Exam- Microsoft Windows 7 Basic - Video Training Course 00:20:00 Final Exam Final Exam- Microsoft Windows 7 Basic - Video Training Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Windows 7 Basic - Video Training Course
Delivered Online On Demand1 hour 57 minutes
£22

CompTIA Network+ Certification - Complete Video Course

4.3(43)

By John Academy

Description: The CompTIA Network+ Certification course provides an user-level knowledge and experience with personal computer operating systems and networks to present fundamental skills and concepts. The content of the course is to prepare you for the job related to networking career. The course includes Network Theory including OSI layers, LANs and WANs, network types and transmissions. You will also learn about the Bounded Network Media like cables, fibre optics, and converters and connectors. You will also be introduced to Network implementations, network communication protocols, IPv4, special addresses, CIDR, IPv6, Routing, TCP/IP services, WAN infrastructure and the Cloud Virtualization Technologies. The course also focuses on the Network Security System, Remote Networking, and Networking Management. Finally, the course will provide you information about Troubleshooting Network and the basics of SOHO (Small Office Home Office) Network. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Network+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Network Theory OSI Layers FREE 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts.prproj 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 Preventing Security Breaches Security Factors 00:15:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Honeypots 00:04:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Network Management Acceptable Use 00:59:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam- CompTIA Network+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Network+ Certification - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Network+ Certification - Complete Video Course
Delivered Online On Demand23 hours 10 minutes
£24

70-646 - Windows Server 2008 Administration

4.3(43)

By John Academy

Description: The 70-646 - Windows Server 2008 Administration course will prepare you for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Throughout the course, you will learn everything that you need to know about passing the exam. The course starts with the installation system of Windows 2008. After that, the course will teach you how to configure the change plan and how to prepare the server for 2008 migration. The course will teach you the ways of monitoring Windows server, the Windows Server Security, Server backup and restore, Maintenance Plan and Windows Server Troubleshooting. In short, the course will teach about the planning for server deployment and management, application and data provisioning, business continuity and high availability, and monitoring and maintain servers. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-646 - Windows Server 2008 Administration is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-646 - Windows Server 2008 Administration is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Preparing for Windows 2008 Installation Overview of Windows Server 2008 Deployment FREE 00:15:00 Making a Deployment Plan for Windows 2008 Server 00:08:00 Planning Migration 00:08:00 Configuration Change Plan Developing a Change Control Process 00:17:00 Developing Configuration Changes 00:13:00 Reviewing Configuration Changes 00:07:00 Preparing for Server 2008 Migration Server Migration 00:16:00 How to Plan for the Server Decommissioning Process 00:14:00 Planning an Example of Commissioning a Windows Server 2008 File Server 00:32:00 Server Migration and Planning for Roles Planning for Windows Server 2008 Hardware 00:15:00 Planning for Windows Server 2008 Core 00:19:00 Combining Windows Server 2008 Server Roles 00:19:00 Planning for Windows Server 2008 File Servers 00:15:00 Understanding Application Server Role Requirements 00:11:00 Overview of the Application Server Role Components 00:06:00 Supporting the .NET Framework 00:07:00 Distributed File System What's Required for DFS 00:08:00 Planning for High Availability in DFS 00:13:00 Managing DFS 00:20:00 Windows Server 2008 High Availability Network Load Balancing 00:13:00 Understanding Failover Clustering in Windows Server 2008 00:11:00 Creating Clusters in Windows Server 2008 00:05:00 Monitoring Windows Server Setting Up Monitoring 00:18:00 Measuring Performance Objects 00:04:00 Calculating a Server Baseline 00:12:00 Which Monitoring Tools to Use 00:07:00 Planning Notification Methods 00:25:00 Windows Server Security Designing a Multi-Layer Defense 00:22:00 Network-Based Security for Windows Server 2008 00:42:00 Host-Based Security for Windows Server 2008 00:20:00 Windows Server Backup and Restore Backup Strategies with Windows Server 2008 00:48:00 Planning a Server Restore Policy 00:16:00 Verifying Restored Data 00:16:00 Planning an EFS Restore Policy 00:07:00 Windows Server Maintenance Plan Planning for Security Update Management 00:22:00 Basic Windows Server 2008 Management Tasks 00:20:00 Automating Windows Server 2008 Maintenance 00:08:00 Planning for Business Continuity Planning for Business Continuity 00:20:00 Reviewing Core Operating System Components 00:07:00 Reviewing Log Files 00:04:00 Evaluating Security Issues 00:10:00 Windows Server Troubleshooting Discovering Hardware Support Issues 00:12:00 Handling Device Driver Failures 00:07:00 Handling Hardware Component Failures 00:05:00 Determining the Scale of Network Issues 00:13:00 Name Resolution in Windows Server 2008 00:12:00 Fixing IP Connectivity Issues 00:09:00 Mock Exam Mock Exam- 70-646 - Windows Server 2008 Administration 00:20:00 Final Exam Final Exam- 70-646 - Windows Server 2008 Administration 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-646 - Windows Server 2008 Administration
Delivered Online On Demand11 hours 58 minutes
£24

Microsoft Internet Explorer 6,7,8 Training

4.3(43)

By John Academy

Description: Are thinking to improve your skills and knowledge on Windows system? Then you are welcome to join this course! Microsoft Internet Explorer 6,7,8 Training is a combined course and designed especially for your benefit. Microsoft Internet Explorer 6 is the sixth major revision of Internet Explorer for Windows operating systems. In the course, you will be introduced to Internet Explorer basics, the Internet Explorer interface, ways to access a website, printing from the web, working with data, set your options, security features and so much more. You will get the basic knowledge of Windows functions, and how to use the mouse and keyboard. Following that, Microsoft Internet Explorer 7 will help you to understand the basics of Internet Explorer, Internet Explorer interface and windows, toolbar, using tabs, searching the web, managing information and history, RSS feeds and much more. Windows Internet Explorer 8 is the latest version of Microsoft's broadly used Windows operating system. With the help of this course, you will get a complete overview of the new start screen, a comprehensive look at touch gesture, an introduction to the default applications and information on using the desktop and its uses. Learning Outcomes: Learn how to understand secure sites Get knowledge of accessing the protected sites Get to know the Internet Explorer's security features Learn to keep yourself safe Learn to manage the information Know of setting your options Learn of managing history Get additional components Commence with Internet Explorer 7 Learn to browse the Internet Know how to set up favourites Learn how to be safe as you are browsing Realise the advanced features Understanding the requirements of internet connection, different types of connections, and opening, setting up and closing Internet Explorer Get an overview of the user interface by using the command area, menu bar, explorer bar, search bar and status bar Discover the application window by learning how to minimize, maximize, restore, and manually resize the window; differences between full screen vs. normal mode; and using zoom feature Enabling, disabling and locking toolbars, along with customizing the command toolbar Get help from help menu, help file, using the table of contents, searching the help file, taking internet explorer tour and online support Learn how to use the navigation buttons, understand parts of web addresses, access your homepage, access websites using address bar and/or hyperlink, and opening page in a new window Opening and closing tabs, switching between tabs, access tabbed help, using tabbed thumbnails and tab list Search the web using search boxes, search engines, within a page, and get some general tips for searching and change the search options Copying text and pictures from the web, saving pictures and web pages, and sending page, link or picture using emails Examine the print preview, page setup, printing page or selection options Understand Favourites; opening, pinning and closing favourites centre; and accessing favourites without Internet Explorer Marking pages or multiple tabs, deleting, maintaining and accessing favourites Organise your favourites by renaming them, adding folders to favourites, and saving and moving them into the folders Understand and manage accelerators, use and get new ones Get to know what are web slices, and how to get, use and find them See the differences between secure and non-secure sites, learn about encryption, digital signatures, cookies, browser cache, and display options Protect your sites using passwords, form filling, learning about the Password Manager, and CAPTCHA Discover more about information bar, pop-up blocker, phishing filter, InPrivate browsing and filtering, and finally managing add-ons Get safety tips and learn about antiviral software, anti-spam software, and firewalls Import and export favourites and cookies Understand and open dialog boxes, set up your homepage, delete temporary internet files, setup parental filtering, automatically disconnect, and set internet explorer as default browser Manage browser history by understanding what it is, access history from address bar, manually delete history items, clear entire history, and set up history options Discover the meaning of RSS Feed, how to view it, subscribing and using feeds, changing feed properties and unsubscribing from feeds Explore HTML, JavaScript, and ActiveX; view and edit HTML source code, more plugins and add-ons, and reset options for internet explorer Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Internet Explorer 6,7,8 Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Internet Explorer 6,7,8 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module : 1 DEFINITIONS 00:30:00 INTERNET EXPLORER BASICS 00:30:00 THE INTERNET EXPLORER INTERFACE 00:30:00 MORE ABOUT TOOLBARS 00:30:00 GETTING HELP 00:30:00 ACCESSING A WEB SITE 00:30:00 SEARCHING THE WEB 00:30:00 WORKING WITH DATA 00:30:00 PRINTING FROM THE WEB 00:30:00 FAVOURITE BASICS 00:30:00 CREATING AND USING FAVOURITES 00:30:00 ORGANIZING FAVOURITES 00:30:00 THE LINKS TOOLBAR 00:30:00 SECURE SITES 00:30:00 ACCESSING PROTECTED SITES 00:30:00 SECURITY FEATURES 00:30:00 KEEPING YOURSELF SAFE 00:30:00 MANAGING INFORMATION 00:30:00 SETTING YOUR OPTIONS, PART ONE 00:30:00 SETTING YOUR OPTIONS, PART TWO 00:30:00 MANAGING YOUR HISTORY 00:30:00 ADDITIONAL COMPONENTS 00:30:00 Module : 2 Definitions to Microsoft Internet Explorer 7 00:15:00 Internet Explorer Basics 00:15:00 The Internet Explorer Interface 00:15:00 The Internet Explorer Window 00:15:00 More About Toolbars 00:15:00 Getting Help 00:30:00 Access a Web Site 00:15:00 Using Tabs 00:15:00 Searching the Web 00:15:00 Working with Data 00:30:00 Printing from the Web 00:15:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:15:00 Organizing Favorites 00:15:00 The Links Folder 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 00:22:00 Keeping Yourself Safe 00:15:00 Managing Information 00:15:00 Setting Your Options 00:15:00 Managing Your History 00:15:00 RSS Feeds 00:15:00 Additional Components 00:15:00 Module : 3 Definitions 00:15:00 Internet Explorer Basics 00:30:00 The Internet Explorer Interface 01:00:00 The Internet Explorer Window 00:30:00 More about Toolbars 00:15:00 Getting Help 01:00:00 Accessing a Web Site 00:30:00 Using Tabs 00:30:00 Searching the Web 01:00:00 Working with Data 01:15:00 Printing from the Web 00:30:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:30:00 Organizing Favorites 00:30:00 Accelerators 01:00:00 Web Slices 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 01:00:00 Keeping Yourself Safe 00:15:00 Managing Information 00:30:00 Setting Your Options 01:00:00 Managing your History 00:30:00 RSS Feeds 00:30:00 Additional Components 00:30:00 Mock Exam Mock Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Final Exam Final Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Internet Explorer 6,7,8 Training
Delivered Online On Demand33 hours
£22

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£24

Windows Server 2016 Complete Video Training

4.3(43)

By John Academy

Description: Windows Server 2016 is a server operating system that is designed to handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions more efficiently. Developed by Microsoft, it is a part of the Windows NT family of operating systems. With the proper knowledge of Windows Server 2016, you can able to handle your office environment proficiently. The Windows Server 2016 Complete Video Training course is for you if you want to master the features and functions of Windows Server 2016. Apart from this, the bundled video course will help you to prepare for the various exam of Microsoft Windows Server 2016 MCSA certification. The course is divided into four sections where each section helps you with a specific exam and the practical use of Windows Server. The 70-740 Exam section teaches you the methods of installing Windows Server in Host and Compute Environments along with the other features such as storage. On the other hand, the 70-741 series teaches you how to do networking with Windows server including implementing Domain Name system, etc. Next, you will learn about the functionality of Windows Server in the 70-742 section that focuses on the Web Application proxy implementations, Microsoft Azure AD and Directory Synchronization, etc. Finally, in the 70-744 part, you will know how to secure your Windows server. In short, the Windows Server 2016 Complete Video Training course helps you to understand all the necessary information skills if you want to use Windows Server 2016. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Windows Server 2016 Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Windows Server 2016 Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installing Windows Servers in Host and Computer Environments Determining Windows Server 2016 Installation FREE 00:54:00 Installing Windows Server 2016 Core and Nano Editions 01:35:00 Managing Windows Installations with Windows PowerShell 00:01:00 Create, Manage, and Maintain Windows Images to Deploy 00:33:00 Implementing Local and Enterprise Storage Solutions Managing Disks and Volumes in Windows Server 2016 01:00:00 Implementing and Managing Storage Spaces 00:45:00 Configuring Data Deduplication 00:39:00 Understanding Various Types of Storage 00:15:00 Fibre Channel, iSCSI, and Fibre Channel over Ethernet 00:18:00 Understanding iSNS, DCB, and MPIO 00:09:00 Configuring File and Folder Sharing in Windows Server 2016 00:21:00 Implementing Hyper-V Virtualization Installing Hyper-V Virtualization 00:26:00 Configuring Storage and Networking on Hyper-V Hosts 00:38:00 Configuring and Managing Virtual Machines 00:34:00 Implementing Windows Containers Understanding Windows Server and Hyper-V Containers 00:17:00 Deploying Windows Server and Hyper-V Containers 00:08:00 Using Docker to Install, Configure, and Manage Containers 00:12:00 Implementing High Availability Overview of High Availability and Disaster Recovery 00:55:00 Implementing Network Load Balancing 00:25:00 Planning and Configuring Failover Clustering 01:10:00 Maintaining a Failover Cluster 00:15:00 Troubleshooting Failover Clustering 00:11:00 Integrating Failover Clustering and Hyper-V 00:23:00 Configuring Site Availability 00:12:00 Maintaining and Monitoring Server Environments Windows Server Update Services 00:33:00 Windows PowerShell Desired State Configuration (DSC) 00:10:00 Windows Server 2016 Monitoring Tools 00:43:00 Plan and Implement IPv4 and IPv6 Networks Plan and Implement IP Addressing Schemes for IPv4 Networks FREE 01:31:00 Configuring IPv4 Hosts 00:18:00 Managing and Troubleshooting IPv4 Connectivity 00:35:00 Implementing IPv6 for Network Hosts 00:20:00 Implementing IPv6 Transitioning and Coexistence 00:16:00 Installing and Configuring DHCP Overview of the DHCP Server Role 00:16:00 Managing and Troubleshooting DHCP 00:48:00 Installing and Configuring DNS Implementing DNS Servers 00:27:00 Creating and Configuring DNS Zones 00:52:00 Understanding Active Directory Integration 00:23:00 Configuring Advanced DNS Settings 00:41:00 Implementing and Managing IP Address Management Overview of IPAM 00:15:00 IPAM Deployment 00:49:00 Implementing Remote Access Remote Access Overview 00:27:00 Implementing the Web Application Proxy 00:08:00 Planning and Implementing VPNs 00:31:00 Overview of DirectAccess 00:21:00 Implementing DirectAccess 00:27:00 Installing and Configuring Branch Office Networking Configuring Networking for Branch Offices 00:39:00 Implementing Distributed File Systems 00:44:00 Implementing BranchCache 00:19:00 Implementing Advanced Networking Features Implementing Networking Features for High Performance 00:23:00 Implementing Hyper-V Advanced Networking Features 00:13:00 Introduction to Software-Defined Networking 00:10:00 Overview of Network Virtualization 00:06:00 Installing and Configuring Domain Controllers Overview of Active Directory Domain Services FREE 01:00:00 Overview of Domain Controllers 00:30:00 Deploying Domain Controllers 1 01:00:00 Managing Active Directory Objects Overview of AD DS Object Management 00:23:00 Managing User Accounts 01:07:00 Managing Groups 01:06:00 Managing Computer Accounts 00:20:00 Managing Organizational Units 00:41:00 Securing Active Directory Domain Services Securing Domain Controllers 00:33:00 Implementing Account Security 00:48:00 Auditing AD DS 00:26:00 Configuring Managed Service Accounts 00:14:00 Working with Complex AD DS Infrastructures Overview of Advanced AD DS Deployments 00:20:00 Deploying a Distributed AD DS Environment 00:45:00 Overview of AD DS Replication 00:12:00 Configuring AD DS Sites 00:38:00 Implementing Group Policy Overview of Group Policy 00:39:00 Creating and Configuring GPOs 00:56:00 Monitoring and Troubleshooting Group Policy 00:18:00 Security Management Using Group Policy 00:54:00 Managing User Environments 00:22:00 Understanding Microsoft Azure AD and Directory Synchronization Planning Directory Synchronization 00:24:00 Implementing Azure AD Connect 00:12:00 Managing Identities with Directory Synchronization 00:14:00 Monitoring and Recovering AD DS Monitoring AD DS 00:27:00 Database Management 00:07:00 Backup and Recovery in AD DS 00:21:00 Implementing Active Directory Certificate Services Overview of Public Key Infrastructure and AD CS 00:17:00 Deploying Certificate Authority Hierarchy 00:19:00 Administering Certificate Authorities 00:13:00 Deploying and Managing Certificates 00:26:00 Managing Revocation and Distribution 00:07:00 Configuring Certificate Recovery 00:08:00 Implementing Active Directory Federation Services (AD FS) Overview of AD FS 00:17:00 Planning and Deploying AD FS 00:35:00 Overview of Web Application Proxy 00:08:00 Implementing Active Directory Rights Management Services Overview of AD RMS 00:14:00 Deploying AD RMS 00:14:00 Protecting Content with AD RMS 00:09:00 Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Windows Server 2016 Complete Video Training
Delivered Online On Demand48 hours
£22