• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3449 Courses

Deep Learning with Real-World Projects

By Packt

You will learn Python-based deep learning and machine learning techniques through this course. With numerous real-world case studies, we will go over all the mathematics needed to master deep learning algorithms. We will study Backpropagation, Feed Forward Network, Artificial Neural Networks, CNN, RNN, Transfer Learning, and more.

Deep Learning with Real-World Projects
Delivered Online On Demand34 hours 31 minutes
£338.99

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Data Science and Machine Learning with R from A-Z Course [Updated for 2021]

By Packt

In this practical, hands-on course, you'll learn how to use R for effective data analysis and visualization and how to make use of that data in a practical manner. You will learn how to install and configure software necessary for a statistical programming environment and describe generic programming language concepts as they are implemented in a high-level statistical language.

Data Science and Machine Learning with R from A-Z Course [Updated for 2021]
Delivered Online On Demand28 hours 50 minutes
£101.99

Electrical Engineering with Trigonometry

5.0(1)

By LearnDrive UK

Merge the worlds of Electrical Engineering and Trigonometry with our comprehensive course. Gain practical skills and theoretical knowledge to excel in the field.

Electrical Engineering with Trigonometry
Delivered Online On Demand1 hour
£5

Snowflake - Build and Architect Data Pipelines Using AWS

By Packt

The course helps you learn Snowflake from scratch and explore a few of its important features. You will build automated pipelines with Snowflake and use the AWS cloud with Snowflake as a data warehouse. You will also explore Snowpark to be worked on the data pipelines.

Snowflake - Build and Architect Data Pipelines Using AWS
Delivered Online On Demand8 hours 39 minutes
£52.99

Excel VBA Programming - The Complete Guide

By Packt

Automate your Excel workflow, accelerate your productivity, and master the fundamentals of programming with VBA!

Excel VBA Programming - The Complete Guide
Delivered Online On Demand17 hours 19 minutes
£134.99

Supply Chain in Upstream Oil & Gas: Purchasing & Procurement

By EnergyEdge - Training for a Sustainable Energy Future

Dive into the world of purchasing and procurement in the upstream oil & gas sector with EnergyEdge's specialized classroom training program.

Supply Chain in Upstream Oil & Gas: Purchasing & Procurement
Delivered In-PersonFlexible Dates
£2,299 to £2,399

The main outcome of this training course is to provide you with the knowledge to carry out the functions of a fire marshal. - Please note, this course also contains all of the content in the Basic Fire Awareness and Fire Extinguisher courses.

Fire Marshal
Delivered Online On Demand
£35

SQL Database Management

4.5(3)

By Studyhub UK

Dive into the world of structured data manipulation and management with the SQL course. Explore database fundamentals, constraints, functions, clauses, and advanced concepts such as joins and wild cards. From creating to altering databases, this course empowers you with a versatile skill set to navigate and manipulate data efficiently using SQL. Learning Outcomes: Acquire a foundational understanding of SQL, its role, and importance in database management. Master the creation, organization, and manipulation of databases. Implement constraints to ensure data integrity and enforce business rules. Utilize SQL functions to transform and manipulate data effectively. Employ SQL clauses to filter, sort, and analyze data for specific purposes. Perform alterations on databases and tables to accommodate evolving data needs. Explore the intricacies of joins and relationships to retrieve and consolidate data from multiple tables. Harness the power of wild cards to perform flexible and dynamic data searches. Why buy this SQL Database Management? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the SQL Database Management there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This SQL Database Management does not require you to have any prior qualifications or experience. You can just enrol and start learning.  Aspiring Database Administrators and SQL Developers. Software Engineers Seeking Proficiency in SQL for Application Development. Data Analysts and Business Intelligence Professionals. IT Professionals Looking to Enhance Their Database Management Skills. Prerequisites This SQL Database Management was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path SQL Developer - $70,000 to $110,000/year. Database Administrator - $60,000 to $100,000/year. Data Analyst - $60,000 to $90,000/year. Business Intelligence Developer - $70,000 to $120,000/year. Database Manager - $80,000 to $130,000/year. Course Curriculum Unit 01: Introduction Module 01: Introduction 00:09:00 Module 02: Xampp (PHPmyadmin) installation 00:05:00 Unit 02: Getting Started With Databases Module 01: Creating a database 00:02:00 Module 02: Creating Tables 00:03:00 Module 03: More about Tables 00:01:00 Module 04: Inserting into Tables 00:03:00 Module 05: Updating and Deleting 00:04:00 Module 06: Data Types 00:03:00 Module 07: Conditional and comparison operators 00:04:00 Unit 03: Constraints Module 01: Primary Keys 00:05:00 Module 02: Foreign Keys 00:07:00 Module 03: Indexes 00:03:00 Module 04: Unique Indexes 00:03:00 Unit 04: SQL Functions Module 01: Functions (Part: 01) 00:02:00 Module 02: Functions (Part: 02) 00:03:00 Unit 05: SQL Clauses Module 01: Basic Queries and Where Claueses 00:04:00 Module 02: Order by 00:03:00 Module 03: Distinct 00:05:00 Module 04: In 00:04:00 Module 05: Group by 00:07:00 Unit 06: Alters Module 01: Alters (Part: 01) 00:03:00 Module 02: Alters (Part: 02) 00:05:00 Module 03: Alters (Part: 03) 00:05:00 Unit 07: All about Joins and SQL Relations Module 01: Aliases 00:04:00 Module 02: Inner joins 00:07:00 Module 03: Left and right joins 00:06:00 Module 04: Unions 00:06:00 Unit 08: Wild Cards Module 01: Wild Cards (Part: 01) 00:07:00 Module 02: Wild cards (Part: 02) 00:05:00 Unit 09: More Advanced Areas of SQL Module 01: Views 00:09:00 Module 02: Creating Functions 00:07:00 Module 03: Triggers 00:09:00 Assignment Assignment - SQL 00:00:00

SQL Database Management
Delivered Online On Demand2 hours 33 minutes
£10.99

Data Analysis with Pandas and Python

By Packt

This course offers an immersive experience in data analysis, guiding you from initial setup with Python and Pandas, through series and DataFrame manipulation, to advanced data visualization techniques. Perfect for enhancing your data handling and analysis skills.

Data Analysis with Pandas and Python
Delivered Online On Demand19 hours 26 minutes
£67.99