• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

460 Courses

The Complete Microsoft OneDrive Course

5.0(10)

By Apex Learning

Overview This comprehensive course on The Complete Microsoft OneDrive Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This The Complete Microsoft OneDrive Course comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this The Complete Microsoft OneDrive Course. It is available to all students, of all academic backgrounds. Requirements Our The Complete Microsoft OneDrive Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 83 lectures • 05:21:00 total length •The Complete Microsoft OneDrive Course -Mastering OneDrive Promo: 00:01:00 •Quick Reminder - You Can Ask Me Anytime: 00:01:00 •Another Quick Reminder: You Facebook Group: 00:01:00 •Quick Win - Create a Folder and Rename It: 00:01:00 •Another Quick Quick Win - Share and Collaborate: 00:01:00 •What's OneDrive: 00:03:00 •OneDrive Free and Paid Plans: 00:04:00 •OneDrive Sign up: 00:05:00 •OneDrive Personal Vault: 00:02:00 •OneDrive PC folder Backup: 00:02:00 •OneDrive Desktop App Download and Installation: 00:02:00 •OneDrive Mobile App Download and Installation: 00:04:00 •Quick Win - Change the View of Displayed Files and Folder: 00:01:00 •Another Quick Win Create a New Album: 00:01:00 •Complete OneDrive Environment: 00:06:00 •Upload and Download in OneDrive: 00:03:00 •Creating New File and Folder in OneDrive: 00:02:00 •Selecting Files and Folder in OneDrive: 00:01:00 •Sharing and collaborating files and folder in OneDrive: 00:04:00 •Other options in top bar of the files and folder: 00:04:00 •Other options in top bar of the files and folder part 2: 00:08:00 •Picture options in OneDrive: 00:03:00 •Right Click options in OneDrive: 00:01:00 •Personals Valid in OneDrive: 00:02:00 •Personals Valid Options in OneDrive: 00:03:00 •Shared Folder in OneDrive: 00:02:00 •OneDrive Settings - Storage Management: 00:03:00 •OneDrive Settings (cont.): 00:04:00 •Microsoft OneDrive Mobile Version: 00:07:00 •Complete Microsoft Word Environment: 00:05:00 •Ribbon Guide: 00:01:00 •Menu and Groups Guide: 00:02:00 •Learn Functions and Options Then Projects: 00:01:00 •Microsoft Word Home Menu Tools: 00:17:00 •Microsoft Word Home Reviewing and Viewing Mode: 00:02:00 •Microsoft Word File Menu: 00:05:00 •Microsoft Word Insert Menu - Page Break and Table: 00:08:00 •Microsoft Word Insert Picture Menu: 00:05:00 •Microsoft Word Word Inserting Header and Footer, symbol and emoji: 00:05:00 •Microsoft Word Layout Menu: 00:02:00 •Microsoft OneDrive References Menu: 00:04:00 •Microsoft Word Review Menu: 00:04:00 •Microsoft Word View and Help: 00:02:00 •Timetable Making in Microsoft Word: 00:06:00 •Bill System in Microsoft Word: 00:06:00 •Microsoft Excel In OneDrive Environment: 00:03:00 •Microsoft Excel Home (Part 1): 00:11:00 •Microsoft Excel Number Formats: 00:03:00 •Microsoft Excel Conditional Format: 00:03:00 •Microsoft Excel Formatting a Table: 00:07:00 •Microsoft One Drive Insert: 00:06:00 •Microsoft Data, Review and View: 00:04:00 •Salary Table in Microsoft Excel: 00:06:00 •Salary Table in Microsoft Excel (cont.): 00:07:00 •Microsoft PowerPoint Environment: 00:02:00 •Microsoft PowerPoint Home and Insert Menu: 00:06:00 •Microsoft PowerPoint Insert and Design Menu: 00:05:00 •Microsoft Power Point Animation and Transition and More: 00:04:00 •Projects of PowerPoint: 00:12:00 •OneNote in OneDrive: 00:04:00 •Forms Survey in OneDrive: 00:03:00 •Plain Text in OneDrive: 00:01:00 •OneDrive Profile Management: 00:05:00 •Account OneDrive Settings: 00:03:00 •Quick Win - Create Unknown Password: 00:01:00 •Security Is Everything!!!: 00:01:00 •Quick Win - Insecurity Is Coming from You and Others: 00:01:00 •Understand Security Type or Category: 00:02:00 •Life Savers - You Should Know These: 00:04:00 •Have Proper Password - Start Securing You Now: 00:03:00 •Don't Use the Same Password Anymore: 00:02:00 •Should You Use Longer Password or Complicated!: 00:03:00 •The Best and Only Solution to Make and Keep Password Un-Crack-Able: 00:08:00 •Last-pass Setup and Configure: 00:10:00 •Last-Pass Options Part 1: 00:03:00 •Last-Pass Options Part 2: 00:04:00 •Last-Pass Option Part 3: 00:04:00 •2FA Makes You Even Stronger in Password: 00:05:00 •Last-Pass & Authy Mobile App: 00:02:00 •Security Is Everything, Keep Secured Your Devices: 00:07:00 •Security on Your Data and Privacy: 00:08:00 •Congratulations - You Are Now a Master of OneDrive: 00:01:00 •Assignment -The Complete Microsoft OneDrive Course: 00:00:00

The Complete Microsoft OneDrive Course
Delivered Online On Demand5 hours 21 minutes
£12

Cyber Security Awareness Training

4.8(9)

By Skill Up

Cyber security is essential for everyone, not just IT professionals. This course will teach you the basics of cyber security and how to protect yourself and your organization from cyber attacks.

Cyber Security Awareness Training
Delivered Online On Demand3 hours 2 minutes
£25

Java Certification Cryptography Architecture

4.5(3)

By Studyhub UK

Embark on a journey into the world of Java cryptography with our course, 'Java Certification Cryptography Architecture.' This course is designed to provide a deep dive into the critical aspects of Java's cryptographic capabilities, offering a blend of theoretical knowledge and practical application. Start with the basics in our introductory section, which sets the stage for a deeper exploration of Java Cryptography Architecture. As you progress, the course meticulously unfolds the complexities of message digest algorithms, MAC (Message Authentication Code), and PBKDF2 (Password-Based Key Derivation Function 2). This course is not just about coding; it's a comprehensive guide to understanding and implementing Java-based cryptographic solutions in real-world applications. Advance through the curriculum and discover practical examples of hashing, both simple and real-world, enhancing your ability to secure data effectively. Delve into efficient stream-based hashing and learn how to implement robust password hashing using PBKDF2. The course also includes a section on commercial wrapper libraries, demonstrating the integration of Java cryptography in commercial applications. By the conclusion of the course, you'll not only be proficient in Java Cryptography Architecture but also equipped with the skills to apply these cryptographic techniques in various professional scenarios, ensuring data security and integrity. Learning Outcomes Develop a foundational understanding of Java Cryptography Architecture. Learn to implement hashing algorithms and message digest techniques in Java. Gain expertise in creating and using MAC for data security. Master the application of PBKDF2 for secure password hashing. Understand the use of commercial wrapper libraries in Java cryptography. Why choose this Java Certification Cryptography Architecture course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Java Certification Cryptography Architecture course for? Software developers and programmers looking to specialize in Java cryptography. IT professionals seeking to enhance their data security skills. Computer science students interested in cryptography and data protection. System architects designing secure Java-based applications. Security enthusiasts keen on exploring Java's cryptographic capabilities. Career path Java Developer: £25,000 - £50,000 Software Engineer (Java): £30,000 - £60,000 Information Security Analyst: £35,000 - £70,000 Cryptography Engineer: £40,000 - £80,000 Application Security Developer: £38,000 - £75,000 Systems Architect (Java): £45,000 - £85,000 Prerequisites This Java Certification Cryptography Architecture does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Java Certification Cryptography Architecture was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00

Java Certification Cryptography Architecture
Delivered Online On Demand40 minutes
£10.99

HP ProCurve switches for engineers

5.0(3)

By Systems & Network Training

HP ProCurve training course description A hands on course covering the product specifics of HP switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install HP ProCurve switches. Use the command line interface and the web based interface to manage HP ProCurve switches. Configure and troubleshoot HP ProCurve switches. Perform software upgrades and maintain configurations using TFTP. HP ProCurve training course details Who will benefit: Anyone working with HP switches. Particularly aimed at engineers and technicians supporting HP switches. Prerequisites: None. Duration 2 days HP ProCurve training course content Introduction Traditional Ethernet, Hubs, Frames, MAC addresses. Hands on Building a network with a hub What is a switch? Switches versus hubs, the MAC address table, handling unknown addresses. Hands on Building a network with HP switches. Configuration methods How to configure a HP switch using: Console port access menus, CLI, telnet, web based access. Hands on Console access, show commands, using the menus, IP address configuration, telnet. Command Line Interface Operator mode, Manager mode, configuration mode, passwords, online help, CLI commands, basic troubleshooting. Hands on More show commands, basic troubleshooting, setting a password, displaying status and counters. Web based interface Web access, basic format, Getting started. SSL. Hands on Web based configuration. Port configuration Common port configuration tasks, port security, port aggregation. Hands on Configuring ports. Trunking and failover. STP configuration Broadcast storms. What is STP? RSTP. Configuring STP. Hands on Enabling and disabling STP, investigation failover. VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Addressing and VLANs, Layer 3 switches and VLANs. Hands on Setting up VLANS, setting up tagged ports, Inter VLAN traffic. Housekeeping TFTP, software upgrades, downloading configurations. Hands on Software upgrade, downloading a configuration. SNMP SNMP configuration, HP OpenView. Hands on Using SNMP to manage a HP ProCurve switch. Basic troubleshooting Putting it all together. Layer 1 troubleshooting, Layer 2 troubleshooting. Miscellaneous exercises CDP. Logging

HP ProCurve switches for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

HP Switches for engineers

5.0(3)

By Systems & Network Training

HP switches training course description A hands on course covering the product specifics of HP switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install HP switches. Use the command line interface and the web based interface to manage HP switches. Configure and troubleshoot HP switches. Perform software upgrades and maintain configurations using TFTP. HP switches training course details Who will benefit: Anyone working with HP switches. Particularly aimed at engineers and technicians supporting HP switches. Prerequisites: None. Duration 2 days HP switches training course content Introduction Traditional Ethernet, Hubs, Frames, MAC addresses. Hands on Building a network with a hub. What is a switch? Switches versus hubs, the MAC address table, handling unknown addresses. Hands on Building a network with HP switches. Configuration methods How to configure a HP switch using: Console port access menus, CLI, telnet, web based access. Hands on Console access, show commands, using the menus, IP address configuration, telnet. Command Line Interface Operator mode, Manager mode, configuration mode, passwords, online help, CLI commands, basic troubleshooting. Hands on More show commands, basic troubleshooting, setting a password, displaying status and counters. Web based interface Web access, basic format, Getting started. SSL. Hands on Web based configuration. Port configuration Common port configuration tasks, port security, port aggregation, Hands on Configuring ports. Trunking and failover. STP configuration Broadcast storms. What is STP? RSTP. Configuring STP. Hands on Enabling and disabling STP, investigation failover. VLANs What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Addressing and VLANs, Layer 3 switches and VLANs. Hands on Setting up VLANS, setting up tagged ports, Inter VLAN traffic. Housekeeping TFTP, software upgrades, downloading configurations. Hands on Software upgrade, downloading a configuration. SNMP SNMP configuration, HP OpenView NNM. Hands on Using SNMP to manage a HP switch. Basic troubleshooting Putting it all together. Layer 1 troubleshooting, Layer 2 troubleshooting. Miscellaneous exercises CDP. Logging

HP Switches for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Linux Security and Hardening, The Practical Security Guide

By Packt

Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.

Linux Security and Hardening, The Practical Security Guide
Delivered Online On Demand4 hours 15 minutes
£93.99

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

Automation with Ansible Playbooks

By Packt

Using Ansible to automate local and cloud configuration management tasks with Playbooks

Automation with Ansible Playbooks
Delivered Online On Demand17 hours 35 minutes
£13.99

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£24

Python Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This Python Hacking Complete Course will help you learn about configuring IP addresses and installing Metasploitable, adding raw input to the port scanner, returning banners from the open port, finishing and testing the scanner and many more. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme The key elements of Python hacking. The introduction of Python and the process of installing its step-up program. What are SSH and FTP attacks and how to deal with them. How to crack the password using Python hacking What are sniffers, flooders and spoofers. What is coding DNS spoofer and learn the steps involved in the process. What is network analysis and how it is beneficial for Python hacking. Understand what is multi-functioning Reverse and gain in-depth knowledge of the same. The website penetration testing and how to use it for effective Python hacking. Why Python Hacking Complete Course right for you? This Python Hacking Complete Course is the perfect way to kickstart your career in the field of Python programming. This online course will provide you with a comprehensive understanding of the VirtualBox and Kali Linux installation. You will also get to understand the port and vulnerability scanning so as to gain proficiency in Python hacking. By the end of the course, you will have theoretical knowledge of Python hacking and understand the tools and strategies required to master hacking using Python programming. Python Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction and Setup Welcome to Python for Ethical Hacking! VirtualBox installation Kali Linux Installation Adding Guest Additions Port and Vulnerability Scanning Coding a Simple Port Scanner Adding Raw_Input to Our Port Scanner Scanning the First 1,000 Ports Coding an Advanced Port Scanner Part 1 Coding an Advanced Port Scanner Part 2 Finishing and Testing our Scanner Configuring IP Address and Installing Metasploitable Returning Banner from Open Port Coding a Vulnerability Scanner Part 1 Coding a Vulnerability Scanner Part 2 SSH and FTP Attacks Automating SSH Login Part 1 Automating SSH Login Part 2 Testing Our SSH Login Program Coding a SSH Brute-Forcer Executing Commands on Target After Brute-Forcing SSH Anonymous FTP Login Attack Username & Password List Attack on FTP Password Cracking SHA256, SHA512, MD5 Cracking SHA1 Hash with Online Dictionary Getting Password from MD5 Hash Cracking crypt passwords with salt Sniffers, Flooders and Spoofers Changing MAC Address Manually Coding MAC Address Changer Theory Behind ARP Spoofing Crafting Malicious ARP Packet Coding ARP Spoofer Forwarding Packets and Restoring ARP Tables Spoofing Our IP Address and Sending Message with TCP Payload Running SynFlooder with Changed Source IP Address Getting Source and Destination MAC Address from Received Packets Sniffing FTP Username and Password Part 1 Sniffing FTP Username and Password Part 2 Getting Passwords from HTTP Websites Cloning Any Webpage Printing DNS Queries Coding DNS Spoofer Redirecting Response to Cloned Page Setting IP Table Rules and Running DNS Spoofer Network Analysis Analyzing Ethernet Header Analyzing IP Header Part 1 Analyzing IP Header Part 2 Analyzing TCP Header Multi-Functioning Reverse Theory Behind Socket Programming Wine and Pyinstaller Installation Setting Up Listener Establishing Connection Between Target and Server Implementing Send & Receive Functions Executing Commands on Target System Importing JSON Library to Parse Data Converting Python backdoor to .exe Using OS library to Change Directory Downloading & Uploading Files to Target PC Hiding our Backdoor and Creating Persistence Trying to Connect to Server Every 20 Seconds Downloading Files to Target PC Capturing Screenshot on Target PC Administrator Privilege Check Starting Other Programs with Our Shell Running Our Shell As an Image, Audio, PDF Coding a Keylogger Installing Pynput Printing Space Character Calling Timer on Our Keylogger Adding Keylogger to Our Backdoor Command and Control Center What is a Threaded Server? Accepting Connections with a Thread Managing Multiple Sessions Testing Threaded Server with Windows 10 target Fixing Q Command Coding Exit Function Attacking Multiple Targets and Gathering Botnet Website Penetration Testing Stealing Saved Wireless Passwords Saving Passwords to a File Bruteforcing Gmail Bruteforcing Any Login Page Part 1 Bruteforcing Any Login Page Part 2 Finding Hidden Directories Part 1 Finding Hidden Directories Part 2 Discovering Subdomains Changing HTTP Headers Starting Basic and Digest Authentication Bruteforcer Controlling Threads Coding Run Function Printing Usage and Testing Our Program Taking a Look at Ransomware Who should take this course? This comprehensive Python Hacking Complete Course is specially designed for Python developers interested in network security and ethical hacking. Those aspiring to accelerate their career in Python programming or want to improve their job prospects can also take this career-advancement Python hacking course. Entry Requirements There are no academic entry requirements for this Python Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Python Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Python Hacking Complete Course
Delivered Online On Demand
£25
1...34567...46