• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

137 Courses

Concept Pro - Complete CCTV Solutions (Welwynn Garden Branch)

By Videcon Training

Assessment and Planning: Survey the area where you want to install CCTV cameras. Identify key areas that need surveillance such as entry points, blind spots, and valuable assets. Determine the number of cameras needed and their types (e.g., dome, bullet, PTZ) based on the coverage required and environmental conditions. Plan the placement of cameras considering factors like lighting conditions, obstructions, and the angle of view required. Selecting Equipment: Choose high-quality CCTV cameras and other necessary equipment such as DVRs (Digital Video Recorders) or NVRs (Network Video Recorders), cables, connectors, power supplies, and storage devices. Ensure compatibility between cameras and recording devices. Consider features like resolution, night vision capability, and weather resistance. Mounting Cameras: Install cameras at the planned locations using appropriate mounting brackets or housings. Ensure cameras are securely fixed to prevent tampering or theft. Adjust the angle and direction of each camera to cover the desired area effectively. Running Cables: Plan the route for cables connecting cameras to the recording device. Use weatherproof cables suitable for outdoor installation. Conceal cables where possible to prevent tampering and maintain aesthetics. Connecting Components: Connect cameras to the DVR/NVR using appropriate cables and connectors. Ensure proper power supply to cameras and recording devices. Configure network settings if using an IP-based CCTV system for remote viewing. Configuring Settings: Access the DVR/NVR interface and configure settings such as recording schedule, motion detection, and video quality. Set up user accounts and passwords to restrict access to the system. Test the system to ensure cameras are capturing footage and recording properly. Remote Viewing (Optional): Set up remote viewing capabilities to access live or recorded footage from smartphones, tablets, or computers. Configure port forwarding on your router if accessing the system from outside the local network. Install and configure the necessary software or mobile apps provided by the CCTV system manufacturer. Testing and Maintenance: Test the system thoroughly to ensure all cameras are functioning correctly and recording as expected. Regularly check and clean cameras to maintain optimal performance. Update firmware and software periodically to patch security vulnerabilities and access new features.  

Concept Pro - Complete CCTV Solutions (Welwynn Garden Branch)
Delivered In-PersonFlexible Dates
£100

Art Craft Yoga - A Combined Life Drawing & Yoga Workshop

By Art Craft Studios

Enjoy the art of life drawing and yoga during this artistic relaxation class in London for beginners. If like us, you find yourself having to choose between being healthy or creative, then this workshop is the perfect option for you. You'll enjoy a combination of relaxation, stretching, and the opportunity to artistically express yourself all at the same time. Not only that, but it's also something fun and different to enjoy with friends and like-minded people. Life drawing and yoga go hand in hand as they are both therapeutic and tranquil. As you focus on the movements and techniques, that both life drawing and yoga provide, you leave your troubles behind. In this combined workshop you will: - Relax and stretch in a calm creative environment, whilst fellow guests observe the interesting shapes yoga can provide. - Draw from observation of a live yoga model (your fellow guests) using yoga shapes to help you. It's all about shorter drawings and overcoming the 'fear of the blank page'! - Feel refreshed, creative, and be able to take home a series of beautiful drawings. No yoga or creative skills are needed, our friendly hosts will guide you step-by-step through the experience with demonstrations and examples and adapt to suit your personal needs.  We will supply everything you need including a matt. But if you want to bring your own you can. Please wear comfortable clothes. How will it work?  For half the class you will be a yogi and for the other half of the class you will be an artist Everyone in the class will be modelling and drawing each other. On arrival you can decide whether you want to be the yogi or the artist first but either way you are going to experience both.  Yoga: We've designed simple yoga poses most people can achieve and are perfect for drawing. Yogi Annie will take you through a series of stretching exercises for 35mins. She will demonstrate each pose, give you plenty of rest between movements and adapt the pose to suit your needs.  Life drawing: You’ll be taken on a journey of drawing exercises with artist Klara. Whilst drawing the yogi models, for 35mins we will explore different tools such as pencil or charcoal and drawing techniques such as continuous line and blind drawing. These contemporary drawing exercises are perfect for beginners and accomplished artists we are here to support you with examples and demonstrations but you'll have creative freedom so you can be as abstract or as detailed as you like. At the end of the class, we will do some constructive rest and exhibit our drawings and you’ll leave relaxed and stretched and feel creative & healthy and display your drawing at home.  Supporting you on your journey: Artist Klara revived her love of interpreting the human form 5 years ago, through the respected Dulwich Art Group. Over the last year she has taken on her first couple of commissions, and enjoys being part of the lively Instagram artist community as @the.pomegranate.art Yogi Annie has been practicing yoga for 10yrs. She gained her training for Vinyasa Flow in 2018 and has since furthered her teaching skills with Yin Yoga and Yoga Nidra. Her own practice is with other teachers including Restorative & Iyengar which help with her teaching skills.

Art Craft Yoga - A Combined Life Drawing & Yoga Workshop
Delivered In-PersonFlexible Dates
£30

Building Successful Work Relationships (Second Edition)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Successful Work Relationships (Second Edition)
Delivered OnlineFlexible Dates
Price on Enquiry

Female Leadership Retreat - 'Intrinsically You'

5.0(5)

By Puritas

Welcome to the Female Leadership Retreat - Intrinsically You! Come join us for a transformative 2 day (1 night) experience, where women come together to empower, inspire, and connect. At this leadership retreat, you'll have the opportunity to unleash your leadership potential, participate in workshops and discussions led by industry experts, and network with like-minded individuals. Embrace your authentic self and explore the leader within you in a supportive and encouraging environment. This retreat is designed to inspire growth and confidence in every attendee for women within Senior Leadership roles, Directors and Business Owners. You will be part of a small, intimate group with each retreat limited to just 10 guests. The environment will be calm, welcoming, and inclusive, with an informal and relaxed format that is supportive. The entire experience will leave you feeling energised with greater clarity, a new sense of purpose, and new personal insights, ready to fully engage with the next steps of your leadership journey. Don't miss out on this opportunity to invest in yourself and connect with a community of strong, empowered women. Join us at the all-inclusive*, Female Leadership Retreat - 'Intrinsically You' and embrace your leadership potential! *Price includes all accommodation, food and refreshments provided, use of spa facilities and training materials and a 1:1 coaching session following the event at a time to suit you. (Note: price excludes individually booked spa treatments, which can be organised directly with the venue in advance by participants.) Now is your time to step back, reflect and re-energise!

Female Leadership Retreat - 'Intrinsically You'
Delivered In-PersonFlexible Dates
£1,655

Complete Web Application Penetration Testing & Security

4.9(27)

By Apex Learning

Overview This comprehensive course on Complete Web Application Penetration Testing & Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Complete Web Application Penetration Testing & Security comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Complete Web Application Penetration Testing & Security. It is available to all students, of all academic backgrounds. Requirements Our Complete Web Application Penetration Testing & Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 12 sections • 60 lectures • 14:18:00 total length •About The Course: 00:03:00 •Web Attack Simulation Lab: 00:12:00 •Web application technologies 101 - PDF: 00:47:00 •HTTP Protocol Basics: 00:11:00 •Encoding Schemes: 00:13:00 •Same Origin Policy - SOP: 00:06:00 •HTTP Cookies: 00:11:00 •Cross-origin resource sharing: 00:05:00 •Web application proxy - Burp suite: 00:09:00 •Fingerprinting web server: 00:05:00 •DNS Analysis - Enumerating subdomains: 00:04:00 •Metasploit for web application attacks: 00:12:00 •Web technologies analysis in real time: 00:03:00 •Outdated web application to server takeover: 00:08:00 •BruteForcing Web applications: 00:06:00 •Shodan HQ: 00:07:00 •Harvesting the data: 00:05:00 •Finding link of target with Maltego CE: 00:09:00 •Cross Site Scripting- XSS - PDF: 00:34:00 •Cross site scripting: 00:07:00 •Reflected XSS: 00:14:00 •Persistent XSS: 00:11:00 •DOM-based XSS: 00:10:00 •Website defacement through XSS: 00:09:00 •XML Documents & database: 00:14:00 •Generating XSS attack payloads: 00:13:00 •XSS in PHP, ASP & JS Code review: 00:13:00 •Cookie stealing through XSS: 00:12:00 •Advanced XSS phishing attacks: 00:08:00 •Advanced XSS with BeEF attacks: 00:10:00 •Advanced XSS attacks with Burp suite: 00:08:00 •Code Review Guide: 03:11:00 •SQL Injection attacks - PDF: 00:45:00 •Introduction to SQL Injection: 00:16:00 •Dangers of SQL Injection: 00:05:00 •Hunting for SQL Injection vulnerabilities: 00:20:00 •In-band SQL Injection attacks: 00:27:00 •Blind SQL Injection attack in-action: 00:10:00 •Exploiting SQL injection - SQLMap: 00:09:00 •Fuzzing for SQL Injection - Burp Intruder: 00:14:00 •CSRF or XSRF attack methods: 00:12:00 •Anti-CSRF Token methods: 00:15:00 •Anti-CSRF token stealing-NOT easy: 00:11:00 •Authentication bypass-hydra: 00:11:00 •HTTP Verb Tampering: 00:09:00 •HTTP parameter pollution - HPP: 00:06:00 •Authentication: 00:10:00 •Client side control bypass: 00:10:00 •LFI & RFI attacks: 00:13:00 •Unrestricted file upload - content type: 00:06:00 •Unrestricted File Upload - Extension Type: 00:06:00 •Remote code execution using Shell Uploads: 00:09:00 •XXE attacks in action: 00:14:00 •Advanced Intruder attack types: 00:23:00 •Cross window messaging: 00:02:00 •Defense in depth applied to web app: 00:02:00 •Drupagedden: 00:02:00 •Finding details with open source: 00:17:00 •Out of band XXE: 00:02:00 •Website auditing: 00:02:00

Complete Web Application Penetration Testing & Security
Delivered Online On Demand14 hours 18 minutes
£12

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

Burp Suite Unfiltered - Go from a Beginner to Advanced

By Packt

Welcome to this course on Burp Suite that will help you progress from absolute zero to an advanced level. Together, we will explore how all the tools and tabs of the Burp Suite work and how we can use them effectively to our advantage. This complete hands-on course will help you ace Burp Suite with no prior hacking experience.

Burp Suite Unfiltered - Go from a Beginner to Advanced
Delivered Online On Demand6 hours 6 minutes
£82.99

Blues singing courses

By LondonSinging

Enjoy our outstanding blues singing courses for adults and develop the blues growl used by Bessie Smith, Big Bill Broonzy or Little Richard. Discover amazing vocal techniques that will make your blues feel authentic and enhance your vocal abilities under the tutoring of experts.

Blues singing courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Pop singing courses

By LondonSinging

Fans of Taylor Swift, Lady Gaga or Michael Jackson will be pleased to attend our fantastic pop singing courses offered in a relaxed and non-judgmental environment. Sing your favourite songs while improving your vocal abilities immensely. Open to adults from beginners to advanced.

Pop singing courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Web Application Penetration Testing Course

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 38 minutes
£25
1...45678...14