• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8523 Courses

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Efficient Collaboration: Mastering Office 365

By Compete High

🚀 Unlock Seamless Teamwork with 'Efficient Collaboration: Mastering Office 365' 🚀 Are you ready to revolutionize the way your team works together? Say goodbye to productivity bottlenecks and hello to streamlined collaboration with our comprehensive online course: 'Efficient Collaboration: Mastering Office 365.'   🌐 Why Office 365? In today's fast-paced business environment, effective collaboration is non-negotiable. Microsoft Office 365 stands as the ultimate toolkit, empowering teams to communicate, share, and achieve together seamlessly. From Word and Excel to Teams and SharePoint, this suite offers unparalleled potential for enhanced productivity.   🔥 What Will You Learn? 📈 Maximize Productivity: Discover the hidden gems within each Office 365 app to boost your team's efficiency and output. 🤝 Streamline Communication: Unleash the full power of Microsoft Teams, fostering real-time collaboration and communication across your organization. 🌐 Master Cloud Collaboration: Dive into SharePoint and OneDrive to facilitate secure and efficient document sharing, ensuring your team is always on the same page. 🔄 Automation Techniques: Learn how to automate repetitive tasks with Power Automate, saving time and reducing errors. 📱 Mobile Collaboration: Extend your collaboration capabilities to mobile devices, allowing your team to work from anywhere.   🎓 Why Choose Our Course? ✅ Expert Instructors: Taught by seasoned Office 365 professionals with hands-on industry experience. ✅ Interactive Learning: Engage in practical exercises and real-world scenarios to reinforce your understanding. ✅ Lifetime Access: Enjoy access to course materials and updates for a lifetime, ensuring your skills remain cutting-edge. ✅ Community Support: Join a vibrant community of learners, exchanging insights and overcoming challenges together.   🌟 Who Is This Course For? Business Owners Project Managers Office Administrators Team Leaders Anyone looking to supercharge their collaboration skills   💡 Enroll Today and Transform Your Team's Collaboration! Don't let outdated collaboration methods hinder your team's potential. Join 'Efficient Collaboration: Mastering Office 365' today and unlock the full power of Office 365. Take the first step towards a more connected, productive, and successful future! Course Curriculum Basic Overview 00:00 Licensing Issues for Business 00:00 Home Vs Business Pricing 00:00 Reasons To Consider the Home Version 00:00 Differing Levels of Business Pricing - Enterprise 00:00 Purchase and Set Up 00:00 Using Office Applications Online 00:00 Using Office Applications Offline 00:00 Do You Need to Be Internet Connected 00:00 Using One Drive - Admin 00:00 Using One Drive Basic Functions 00:00 Skype For Business Installation 00:00 Skype for Business Webinars 00:00 Skype for Business Vs Skype for Desktop 00:00 Microsoft Outlook With Exchange 00:00 Outlook.com Vs Microsoft Exchange 00:00 Managing Tasks With Planner 00:00 The Teams Application 00:00 Invoicing and Management Applications 00:00 Conclusion 00:00 Advanced Overview 00:00 Other 365 Options 00:00 Admin Panel - Part One 00:00 Admin Panel - Part Two 00:00 Document Sharing and Collaboration 00:00 Document Sharing and Collaboration With Delve 00:00 Intranet with Sharepoint 00:00 Intranet with Sharepoint - External App Updates Part Two 00:00 PPT Alternative Onscreen Presentatoins with Sway 00:00 PPT Alternative Onscreen Presentations With Sway - Part Two 00:00 Zapier Like Integrations with Flow - Part One 00:00 Zapier Like Integrations with Flow - Part Two 00:00 Slack Like Conversations With Yammer - Part One 00:00 Slack Like Conversations with Yammer - Part Two - External 00:00 Adding On Applications with Dynamics 365 00:00 Adding on Applications with Dynamics 365 - Part 2 00:00 Create Surveys - Quizzes and Polls with Forms - Part One 00:00 Create Surveys - Quizzes and Polls with Forms 00:00 Using Microsoft To Do 00:00 Conclusion 00:00

Efficient Collaboration: Mastering Office 365
Delivered Online On Demand1 hour 22 minutes
£25

Plumbing Training with Pipe Fitting & Heating Installation

5.0(10)

By Apex Learning

Limited Time Offer | 11-in-1 Bundle | CPD QS Certified | 110 CPD Points | Gifts: Hardcopy + PDF Certificate + SID | Customer Support | Lifetime Access | Enrol Today

Plumbing Training with Pipe Fitting & Heating Installation
Delivered Online On Demand39 hours
£49

Lean Six Sigma Green Belt Course

5.0(10)

By Apex Learning

Overview This comprehensive Lean Six Sigma Green Belt Course has been designed to increase your proficiency in this important field.The course's unique combination of case studies and practical projects guarantees that students will gain expertise in putting Lean Six Sigma ideas into practice. When you finish successfully, you'll get an official certification that will greatly improve your resume and job marketability. Enrol now to start using these crucial skills to advance your career. How will I get my certificate? You might have to finish a written exam or an online quiz during the course in order to receive the certificate for this Lean Six Sigma Green Belt course. You are eligible for the certification if you pass these tests. Here are some essential things to keep in mind: Online tests and quizzes are a crucial part of the certification procedure. It is necessary to pass these exams in order to get certified. The goal of the certification procedure is to verify your knowledge and abilities. Obtaining the certificate validates your proficiency and preparedness in this field. Who is This course for? Anyone can enrol in this Lean Six Sigma Green Belt course, no matter their prior experience or educational background. It is intended to be flexible and inclusive for a wide variety of students. The following are the course's accessibility's five main points: Open to those with any level of education. It is not required to have any prior Lean Six Sigma experience. Ideal for people who want to improve their skills or are new to the field. accepts students from all fields of study and occupation. offers equal opportunities for learning for both professional and personal development. Requirements The Lean Six Sigma Green Belt Course is highly flexible and digitally compatible, designed for convenient access on PCs, Macs, laptops, tablets, and smartphones. You can study at your own pace, with no time limit for completion, and the course is accessible on both Wi-Fi and mobile data. Here are some key aspects: Device-friendly: Suitable for various digital platforms. No time constraints: Learn at your own pace. User-friendly design: Optimised for a smooth online learning experience. Basic English proficiency needed for effective participation. Career Path Having a Lean Six Sigma Green Belt Course will increase the value of your CV and open you up to multiple sectors, such as : Quality Assurance Manager: £30,000 - £60,000 annually. Process Improvement Manager: £35,000 - £70,000 annually. Lean Six Sigma Consultant: £40,000 - £80,000 annually. Operations Manager: £28,000 - £65,000 annually. Project Manager: £30,000 - £70,000 annually. Course Curriculum 11 sections • 25 lectures • 06:17:00 total length •Course Overview: 00:08:00 •Introduction: 00:16:00 •Introduction Part 2: 00:17:00 •Define: 00:25:00 •Define Part 2: 00:20:00 •Measure: 00:13:00 •Measure Part 2: 00:30:00 •Measure Part 3: 00:18:00 •Measure Part 4: 00:15:00 •Analyze: 00:14:00 •Analyze Part 2: 00:17:00 •Analyze Part 3: 00:25:00 •Analyze Part 4: 00:15:00 •Analyze Part 5: 00:15:00 •Analyze Part 6: 00:16:00 •Improve: 00:24:00 •Improve Part 2: 00:12:00 •Improve Part 3: 00:11:00 •Improve Part 4: 00:24:00 •Improve Part 5: 00:15:00 •Control: 00:13:00 •Case Study: 00:10:00 •Conclusion: 00:04:00 •Assignment - Lean Six Sigma Green Belt Course: 00:00:00 •Resources - Lean Six Sigma Green Belt Course: 00:00:00

Lean Six Sigma Green Belt Course
Delivered Online On Demand6 hours 17 minutes
£12

SQL Developer 2014 Intermediate

4.3(43)

By John Academy

Description Due to technology advancement and the increasing reliance on data, SQL developers are in high demand. Many find this path relatively easy in comparison to other technical careers. If you have completed SQL Developer 2014 beginner course and want to get more in-depth knowledge of SQL Server, then this SQL Developer 2014 Intermediate is just for you. Through this course, you will understand the structured query language (SQL) for manipulating business data in the most effective and sensible approach. Obtain the power of Microsoft SQL Server and grasp how to maximise the performance of any SQL that you draft. Take your knowledge to the next level to fully to perform the essential tasks within your business or employment to improve your prospects to succeed in the long run. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module: 01 Topic A Aggregates FREE 00:27:00 Topic B User Defined Types 00:17:00 Topic C Table and Functions 00:10:00 Topic D Managing Code Modules 00:08:00 Module: 02 Topic A Introduction Data Tools 00:19:00 Topic B Connected Database Development 00:20:00 Topic C Updating a Connected Database 00:16:00 Module: 03 Topic A Creating New Objects with TSQL 00:12:00 Topic B Comparing Database Schemas 00:10:00 Topic C Offline Database Development 00:13:00 Topic D Database Project Settings 00:18:00 Module: 04 Topic A Using APPLY 00:15:00 Topic B MERGE Statement 00:23:00 Topic C Creating Recursive Queries 00:08:00 Topic D Grouping Sets 00:12:00 Module: 05 Topic A ROLLUP and CUBE Operators 00:12:00 Topic B Creating Pivot Queries 00:14:00 Topic C Executing Dynamic SQL 00:28:00 Module: 06 Topic A Complex Query Execution 00:26:00 Topic B Using Execution Plans 00:16:00 Topic C Execution Plan Operators 00:12:00 Topic D Common Join Operators 00:16:00 Module: 07 Topic A Hierarchy ID Data Type 00:12:00 Topic B Exploring a Hierarchy 00:09:00 Topic C Sparse Columns 00:16:00 Topic D Column Sets 00:12:00 Module: 08 Topic A Filtered Indexes 00:09:00 Topic B FILESTREAM Storage 00:22:00 Topic C Adding Sequences to Queries 00:22:00 Module: 09 Topic A Introduction to Spatial Data 00:13:00 Topic B Spatial Data in SQL Server 00:23:00 Topic C Manipulating Spatial Shapes 00:10:00 Topic D Interactions Between Objects 00:09:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

SQL Developer 2014 Intermediate
Delivered Online On Demand8 hours 29 minutes
£25

Transformer Operational Principles, Design, Selection, Maintenance and Troubleshooting for Oil and Gas and Utilities

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of transformer operational principles, design, selection, maintenance, and troubleshooting for oil, gas, and utilities with EnergyEdge's comprehensive course.

Transformer Operational Principles, Design, Selection, Maintenance and Troubleshooting for Oil and Gas and Utilities
Delivered In-PersonFlexible Dates
£2,899 to £2,999

Certified Reliability Engineer (CRE) Preparatory Course for ASQ Certification

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your skills with EnergyEdge's Certified Reliability Engineer (CRE) preparatory course for ASQ certification. Join our classroom training now!

Certified Reliability Engineer (CRE) Preparatory Course for ASQ Certification
Delivered In-PersonFlexible Dates
£2,899 to £2,999

Electrical Substation: Design, Construction & Commissioning

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge with EnergyEdge course on electrical substation design, construction, and commissioning. Join us today!

Electrical Substation: Design, Construction & Commissioning
Delivered In-PersonFlexible Dates
£2,899 to £2,999

EWM100 Processes in SAP Extended Warehouse Management - Overview

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM

EWM100 Processes in SAP Extended Warehouse Management - Overview
Delivered OnlineFlexible Dates
Price on Enquiry

ACJ and SCJ Dislocations and Fractures

By Physiotherapy Online

This webinar focuses on educating participants on the identification, diagnosis, and rehabilitation of acromioclavicular joint (ACJ) and sternoclavicular joint (SCJ) injuries. The webinar aims to equip participants with the skills necessary to diagnose these injuries by identifying three signs of each injury. Additionally, participants will learn how to design and implement rehabilitation programs for patients in acute and chronic phases of ACJ and SCJ injuries.

ACJ and SCJ Dislocations and Fractures
Delivered Online On Demand
£30