• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

157 Binary courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Linux Professional Institute Certification (LPIC) 101

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. WORK ON THE COMMAND LINE * LPI Objectives Covered * Role of Command Shell * Shells * Gathering System Info * Identifying the Shell * Changing the Shell * Shell Prompts * Bash: Bourne-Again Shell * Navigating the Filesystem * Help from Commands and Documentation * Getting Help Within the Graphical Desktop * Getting Help with man & info * Bash: Command Line History * Bash: Command Editing * Bash: Command Completion * Shell and Environment Variables * Key Environment Variables * LAB TASKS * USE STREAMS, PIPES, AND REDIRECTS * LPI Objectives Covered * File Redirection * Piping Commands Together * Filename Matching * File Globbing and Wildcard Patterns * Brace Expansion * General Quoting Rules * Nesting Commands * Gotchas: Maximum Command Length * LAB TASKS * MANAGE FILE PERMISSIONS AND OWNERSHIP * LPI Objectives Covered * Filesystem Hierarchy Standard * Displaying Directory Contents * Filesystem Structures * Determining Disk Usage With df and du * File Ownership * Default Group Ownership * File and Directory Permissions * File Creation Permissions with umask * Changing File Permissions * SUID and SGID on files * SGID and Sticky Bit on Directories * User Private Group Scheme * LAB TASKS * CREATE, DELETE, FIND, AND DISPLAY FILES * LPI Objectives Covered * Directory Manipulation * File Manipulation * Deleting and Creating Files * Physical Unix File Structure * Filesystem Links * File Extensions and Content * Which and Type * Where is * Searching the Filesystem * Alternate Search Method * Manually Installed Shared Libraries * LAB TASKS * WORK WITH ARCHIVES AND COMPRESSION * LPI Objectives Covered * Archives with tar * Archives with cpio * The gzip Compression Utility * The bzip2 Compression Utility * The XZ Compression Utility * The PKZIP Archiving/Compression format * LAB TASKS * PROCESS TEXT STREAMS USING FILTERS * LPI Objectives Covered * Producing File Statistics * The Streaming Editor * Replacing Text Characters * Text Sorting * Duplicate Removal Utility * Extracting Columns of Text * Displaying Files * Prepare Text for Display * Previewing Files * Displaying Binary Files * Combining Files and Merging Text * LAB TASKS * SEARCH TEXT FILES USING REGULAR EXPRESSIONS * LPI Objectives Covered * Searching Inside Files * Regular Expression Overview * Regular Expressions * RE Character Classes * Regex Quantifiers * RE Parenthesis * LAB TASKS * PERFORM BASIC FILE EDITING OPERATIONS USING VI * LPI Objectives Covered * Text Editing * vi and Vim * Learning Vim * Basic vi * Intermediate vi * LAB TASKS * CREATE, MONITOR, AND KILL PROCESSES * LPI Objectives Covered * What is a Process? * Process Lifecycle * Process States * Viewing Processes * Signals * Tools to Send Signals * Managing Processes * Tuning Process Scheduling * Job Control Overview * Job Control Commands * Nohup and Disown * Uptime & w * Persistent Shell Sessions with Screen * Using screen * Advanced Screen * LAB TASKS USE RPM, YUM, AND DEBIAN PACKAGE MANAGEMENT * LPI Objectives Covered * Managing Software * RPM Architecture * Working With RPMs * Querying and Verifying with RPM * Installing Debian Packages * Querying and Verifying with dpkg * The alien Package Conversion Tool * Managing Software Dependencies * Using the Yum command * yum downloader * Configuring Yum * The deselect & APT Frontends to dpkg * Aptitude * Configuring APT * LAB TASKS * WORK WITH PARTITIONS, FILESYSTEM, AND DISK QUOTAS * LPI Objectives Covered * Partition Considerations * Logical Volume Management * Filesystem Planning * Partitioning Disks with fdisk & gdisk * Resizing a GPT Partition with gdisk * Partitioning Disks with parted * Non-Interactive Disk Partitioning with sfdisk * Filesystem Creation * Filesystem Support * Unix/Linux Filesystem Features * Swap * Selecting a Filesystem * Filesystem Maintenance * Mounting Filesystems * Mounting Filesystems * Managing an XFS Filesystem * NFS * SMB * Filesystem Table (/etc/fstab) * Configuring Disk Quotas * Setting Quotas * Viewing and Monitoring Quotas * LAB TASKS * LINUX BOOT PROCESS * LPI Objectives Covered * Booting Linux on PCs * GRUB 2 * GRUB 2 Configuration * GRUB Legacy Configuration * Boot Parameters * Uinit * Linux Runlevels Aliases * Systemd local-fs.target and sysinit.target * Runlevel Implementation * System Boot Method Overview * Systemd System and Service Manager * Modifying systemd services * Systemd Targets * Using systemd * Shutdown and Reboot * System Messaging Commands * Controlling System Messaging * LAB TASKS DETERMINE AND CONFIGURE HARDWARE SETTINGS * LPI Objectives Covered * Managing Linux Device Files * Hardware Discovery Tools * Configuring New Hardware with hwinfo * PC Architecture and Bus * DMA & IRQ * USB Devices * USB Architecture * Configuring Kernel Components and Modules * Kernel Modules * Handling Module Dependencies * Configuring the Kernel via /proc/ * LAB TASKS * LINUX FUNDAMENTALS * Unix and its Design Principles * FSF and GNU * GPL ƒ?? General Public License * The Linux Kernel * Components of a Distribution * Red Hat Linux Products * SUSE Linux Products * Debian * Ubuntu * Logging In * got root? * Switching User Contexts * Gathering Login Session Info * LAB TASKS * ADDITIONAL COURSE DETAILS: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC) 101
Delivered on-request, onlineDelivered Online
Price on Enquiry

The Complete Ethical Hacking Course

By Packt

If you are a newbie in the field of ethical hacking or want to become an ethical hacker, this course is just what will get you started. This is a comprehensive course with real-world examples to help you understand the fundamentals of hacking and cyber security.

The Complete Ethical Hacking Course
Delivered Online On Demand
£29.99

CompTIA Network+ Certification (N10-007)

5.0(2)

By Studyhub UK

Embark on a transformative journey through the intricate landscape of networking with the CompTIA Network+ Certification (N10-007). This course isn't just about mastering the intricacies of network models or delving into the depths of cabling and topology; it's about empowering yourself with the skills and knowledge to navigate the digital highways of the modern era confidently. Picture yourself as the architect, laying down the foundations of robust networks, securing them against digital threats, and troubleshooting with finesse. With CompTIA Network+ +, you're not just learning; you're shaping your future in information technology. In this comprehensive course, you'll traverse through 22 meticulously crafted sections, each unlocking a new facet of comptia networking. From understanding the fundamentals of TCP/IP to exploring the nuances of wireless networking and delving into virtualization and cloud computing, every lesson is a stepping stone towards network mastery. Through immersive learning experiences and hands-on comptia network+ practice tests, you'll absorb theoretical knowledge and hone your practical skills, preparing you for real-world challenges. LEARNING OUTCOMES: 1. Master network models and topologies, laying a strong foundation for network architecture. 2. Demonstrate proficiency in TCP/IP fundamentals and routing protocols for effective data transmission. 3. Develop expertise in securing networks against cyber threats, ensuring data integrity and confidentiality. 4. Acquire skills in network troubleshooting and monitoring, enabling swift resolution of issues. 5. Apply wireless networking and cloud computing knowledge to design and implement scalable network solutions. WHY BUY THIS COMPTIA NETWORK+ CERTIFICATION (N10-007)? 1. Unlimited access to the course for forever 2. Digital Certificate, Transcript, student ID all included in the price 3. Absolutely no hidden fees 4. Directly receive CPD accredited qualifications after course completion 5. Receive one to one assistance on every weekday from professionals 6. Immediately receive the PDF certificate after passing 7. Receive the original copies of your certificate and transcript on the next working day 8. Easily learn the skills and knowledge from the comfort of your home CERTIFICATION After studying the course materials of the CompTIA Network+ Certification (N10-007) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COMPTIA NETWORK+ CERTIFICATION (N10-007) FOR? * Aspiring IT professionals seeking to kickstart their careers in networking. * Students aiming to enhance their employability with industry-recognized certifications. * Career changers looking to transition into the dynamic field of information technology. * IT professionals seeking to validate their skills and advance their careers. * Anyone passionate about mastering the intricacies of comptia network and carving a niche in the digital landscape. PREREQUISITES This CompTIA Network+ Certification (N10-007) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network+ Certification (N10-007) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH * Network Administrator: £20,000 - £45,000 Per Annum * Network Engineer: £25,000 - £55,000 Per Annum * Systems Administrator: £22,000 - £50,000 Per Annum * IT Support Technician: £18,000 - £35,000 Per Annum * Cyber Security Analyst: £25,000 - £60,000 Per Annum * Cloud Solutions Architect: £30,000 - £80,000 Per Annum COURSE CURRICULUM Section 01: Introduction Introduction 00:03:00 Section 02: Network Models What is a Model? 00:02:00 OSI vs. TCP/IP Model 00:07:00 Walking Through OSI and TCP/IP 00:12:00 Meet the Frame 00:06:00 The MAC Address 00:07:00 Broadcast vs. Unicast 00:04:00 Introduction to IP Addressing 00:08:00 Packets and Ports 00:05:00 Section 03: Cabling and Topology Network Topologies 00:10:00 Coaxial Cabling 00:05:00 Twisted Pair Cabling 00:06:00 Cat Ratings 00:06:00 Fiber Optic Cabling 00:09:00 Fire Ratings 00:05:00 Legacy Network Connections 00:07:00 Section 04: Ethernet Basics What is Ethernet? 00:07:00 Ethernet Frames 00:07:00 Early Ethernet 00:08:00 The Daddy of Ethernet, 10BaseT 00:03:00 Terminating Twisted Pair 00:14:00 Hubs vs. Switches 00:13:00 Section 05: Modern Ethernet 100BaseT 00:05:00 Connecting Switches 00:05:00 Gigabit Ethernet and 10-Gigabit Ethernet 00:05:00 Transceivers 00:07:00 Connecting Ethernet Scenarios 00:14:00 Section 06: Installing a Physical Network Introduction to Structured Cabling 00:04:00 Terminating Structured Cabling 00:08:00 Equipment Room 00:07:00 Alternative Distribution Panels 00:04:00 Testing Cable 00:09:00 Troubleshooting Structured Cabling, Part 1 00:05:00 Troubleshooting Structured Cabling, Part 2 00:05:00 Using a Toner and Probe 00:03:00 Wired Connection Scenarios 00:11:00 Section 07: TCP/IP Basics Introduction to IP Addressing and Binary 00:13:00 Introduction to ARP 00:04:00 Classful Addressing 00:10:00 Subnet Masks 00:12:00 Subnetting with CIDR 00:10:00 More CIDR Subnetting Practice 00:10:00 Dynamic and Static IP Addressing 00:18:00 Rogue DHCP Servers 00:07:00 Special IP Addresses 00:07:00 IP Addressing Scenarios 00:15:00 Section 08: Routing Introducing Routers 00:15:00 Understanding Ports 00:05:00 Network Address Translation 00:06:00 Implementing NAT 00:03:00 Forwarding Ports 00:18:00 Tour of a SOHO Router 00:12:00 SOHO vs. Enterprise 00:09:00 Static Routes 00:13:00 Dynamic Routing 00:11:00 RIP 00:04:00 OSPF 00:04:00 BGP 00:06:00 Section 09: TCP/IP Applications TCP and UDP 00:07:00 ICMP and IGMP 00:06:00 Handy Tools 00:07:00 Introduction to Wireshark 00:11:00 Introduction to netstat 00:09:00 Web Servers 00:12:00 FTP 00:12:00 E-mail Servers and Clients 00:09:00 Securing E-mail 00:06:00 Telnet and SSH 00:09:00 Network Time Protocol 00:02:00 Network Service Scenarios 00:10:00 Section 10: Network Naming Understanding DNS 00:12:00 Applying DNS 00:19:00 The Hosts File 00:04:00 Net Command 00:08:00 Windows Name Resolution 00:11:00 Dynamic DNS 00:05:00 DNS Troubleshooting 00:13:00 Section 11: Securing TCP/IP Making TCP/IP Secure 00:04:00 Symmetric Encryption 00:06:00 Asymmetric Encryption 00:03:00 Cryptographic Hashes 00:05:00 Identification 00:12:00 Access Control 00:04:00 AAA 00:05:00 Kerberos/EAP 00:08:00 Single Sign-On 00:10:00 Certificates and Trust 00:14:00 Certificate Error Scenarios 00:08:00 Section 12: Advanced Networking Devices Understanding IP Tunneling 00:06:00 Virtual Private Networks 00:13:00 Introduction to VLANs 00:12:00 InterVLAN Routing 00:03:00 Interfacing with Managed Switches 00:11:00 Switch Port Protection 00:07:00 Port Bonding 00:07:00 Port Mirroring 00:04:00 Quality of Service 00:05:00 IDS vs. IPS 00:04:00 Proxy Servers 00:13:00 Load Balancing 00:09:00 Device Placement Scenarios 00:13:00 Section 13: IPv6 Introduction to IPv6 00:13:00 IPv6 Addressing 00:15:00 IPv6 in Action 00:13:00 IPv4 and IPv6 Tunneling 00:05:00 Section 14: Remote Connectivity Telephony Technologies 00:09:00 Optical Carriers 00:03:00 Packet Switching 00:05:00 Connecting with Dial-up 00:05:00 Digital Subscriber Line (DSL) 00:05:00 Connecting with Cable Modems 00:04:00 Connecting with Satellites 00:03:00 ISDN and BPL 00:04:00 Remote Desktop Connectivity 00:05:00 Advanced Remote Control Systems 00:09:00 Section 15: Wireless Networking Introduction to 802.11 00:12:00 802.11 Standards 00:12:00 Power over Ethernet (PoE) 00:04:00 Antennas 00:09:00 Wireless Security Standards 00:16:00 Implementing Wireless Security 00:07:00 Threats to Your Wireless Network 00:07:00 Retro Threats 00:05:00 Wi-Fi Protected Setup (WPS) 00:05:00 Enterprise Wireless 00:06:00 Installing a Wireless Network 00:15:00 Wireless Scenarios 00:07:00 More Wireless Scenarios 00:09:00 Section 16: Virtualization and Cloud Computing Virtualization Basics 00:07:00 Cloud Ownership 00:03:00 Cloud Implementation 00:12:00 Your First Virtual Machine 00:09:00 NAS and SAN 00:16:00 Platform as a Service (PaaS) 00:09:00 Software as a Service (SaaS) 00:03:00 Infrastructure as a Service (IaaS) 00:10:00 Section 17: Mobile Networking Cellular Technologies 00:05:00 Mobile Connectivity 00:07:00 Deploying Mobile Devices 00:05:00 Mobile Access Control 00:06:00 Section 18: Building a Real-World Network Network Types 00:04:00 Network Design 00:10:00 Power Management 00:06:00 Unified Communications 00:11:00 Network Documentation 00:07:00 Contingency Planning 00:10:00 Predicting Hardware Failure 00:05:00 Backups 00:08:00 Section 19: Managing Risk What is Risk Management? 00:06:00 Security Policies 00:08:00 Change Management 00:07:00 User Training 00:03:00 Standard Business Documentation 00:05:00 Mitigating Network Threats 00:05:00 High Availability 00:05:00 Section 20: Protecting Your Network Denial of Service 00:09:00 Malware 00:10:00 Social Engineering 00:04:00 Access Control 00:08:00 Man-in-the-Middle 00:22:00 Introduction to Firewalls 00:05:00 Firewalls 00:10:00 DMZ 00:06:00 Hardening Devices 00:14:00 Physical Security Controls 00:09:00 Testing Network Security 00:08:00 Network Protection Scenarios 00:14:00 Section 21: Network Monitoring SNMP 00:15:00 Documenting Logs 00:09:00 System Monitoring 00:08:00 SIEM (Security Information and Event Management) 00:07:00 Section 22: Network Troubleshooting Network Troubleshooting Theory 00:05:00

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand
£10.99

IT Support Technician Training

By Apex Learning

COURSE OVERVIEW: Are you ready to embark on a journey into the dynamic world of IT support? Our comprehensive "IT Support Technician Training" course will equip you with the knowledge and skills needed to thrive in this ever-evolving industry.  According to recent statistics, the IT support field is projected to grow by a staggering 10% over the next decade, offering exciting opportunities. As businesses and individuals rely on technology for everyday operations, the need for adept IT professionals becomes increasingly evident. With a curriculum from the fundamentals of computing devices to troubleshooting complex IT issues, this course is your gateway to a rewarding and high-paying profession.  Enroll now and unlock a world of IT support opportunities! Join the ranks of skilled professionals making a difference in the digital age.  -------------------------------------------------------------------------------- KEY FEATURES OF THE COURSE: * CPD Certified Course * Uninterrupted 24/7 Learning Assistance * Rich, insightful, and easily digestible learning materials -------------------------------------------------------------------------------- WHO IS THIS COURSE FOR? This IT Support Technician Training course is for anyone who wants to learn the skills they need to be an IT support technician. -------------------------------------------------------------------------------- LEARNING OUTCOME From this IT Support Technician Training, you will learn: * Comprehensive knowledge of computer systems and their respective networks. * How to professionally set up and configure various computing devices. * Efficient and systematic file and data management. * Advanced strategies for IT threat mitigation and computer maintenance. * Essential techniques for troubleshooting computer-related issues. * Introduction and in-depth exploration of databases. * Fundamentals of programming, facilitating a smooth transition into software development. -------------------------------------------------------------------------------- WHY ENROL IN THIS COURSE: Gain unparalleled IT mastery with a top-reviewed curriculum, constantly updated to match the dynamic technological landscape. Learn today's most coveted skills, future-proofing your career. -------------------------------------------------------------------------------- REQUIREMENTS: Basic computer familiarity; no prior technical expertise is essential. -------------------------------------------------------------------------------- CAREER PATH: * IT Support Specialist - £26,000 * System Administrator - £35,000 * Network Engineer - £40,000 * Database Administrator - £42,000 * IT Consultant - £52,000 * Cloud Solutions Architect - £60,000 * Cybersecurity Analyst - £45,000 -------------------------------------------------------------------------------- CERTIFICATION: Upon completing the IT Support Technician Training, you will be awarded a CPD certificate. Employers across the UK recognise this qualification and can help you advance your career in IT support. -------------------------------------------------------------------------------- FAQ What qualifications do I need for an IT technician? You typically need a high school diploma or equivalent for an IT technician. Many companies also want you to have a relevant degree or certification. A strong understanding of computers, networks, and software is essential. On-the-job training is common too. Which course is best for IT technician? The best course for an IT technician often depends on where you want to specialise. Common choices include A+ Certification by CompTIA and Cisco's CCNA. Both offer a good grounding in IT fundamentals. How do I start as an IT technician? To start as an IT technician, first, get your educational basics. Then, go for certifications in your interest area. It helps to gain hands-on experience through internships. Build a strong resume and apply for entry-level positions. Networking with professionals can also open doors. What is the role of IT support? IT support helps users with tech issues. They make sure systems run smoothly. They answer questions, troubleshoot problems, and maintain hardware and software. Their goal? Keep tech working for everyone. What is the role of an IT support technician? An IT support technician is a problem solver. When tech breaks, they fix it. They help users install and update software and maintain hardware. They're the go-to people for tech troubles in a company. -------------------------------------------------------------------------------- COURSE CURRICULUM 16 sections • 64 lectures • 04:52:00 total length •The Case for Computer Literacy: 00:03:00 •Features Common to Every Computing Device: 00:02:00 •Common General-Purpose Computing Devices: 00:02:00 •Networks of Computing Devices: 00:04:00 •Remotely-Accessed Computer Systems: 00:04:00 •Specialized Computer Systems: 00:02:00 •Specialty I/O Devices: 00:01:00 •CPUs: 00:03:00 •Passive and Active Cooling: 00:03:00 •RAM and Active Memory: 00:05:00 •Motherboards: 00:03:00 •Power Supplies: 00:03:00 •AMA - Ask Me Anything about System Hardware: 00:07:00 •Ports and Connectors: 00:03:00 •General Use I/O Devices: 00:02:00 •AMA - Ask Me Anything about I/O, Ports and Peripherals: 00:07:00 •Basics of Binary: 00:04:00 •Storage Technologies: 00:04:00 •Mass Storage Variation: 00:03:00 •AMA - Ask Me Anything about Data Storage and Sharing: 00:07:00 •Operating System Functions: 00:04:00 •Operating System Interfaces: 00:05:00 •AMA - Ask Me Anything about Understanding OS's: 00:05:00 •Preparing the Work Area: 00:02:00 •Setting up a Desktop PC: 00:01:00 •Completing PC Setup: 00:04:00 •AMA - Ask Me Anything about Setting up and Configuring a PC: 00:09:00 •Personalizing a Tablet: 00:08:00 •AMA - Ask Me Anything about Mobile Devices Part 1: 00:07:00 •AMA - Ask Me Anything about Mobile Devices Part 2: 00:07:00 •File Management Tools: 00:02:00 •File Manipulation: 00:06:00 •Backups: 00:03:00 •AMA - Ask Me Anything about Managing Files: 00:08:00 •Walking Survey of Applications: 00:03:00 •Managing Applications: 00:03:00 •Applications and Extensions: 00:04:00 •AMA - Ask Me Anything about Working with Applications: 00:07:00 •Wi-Fi Setup: 00:06:00 •Going High Speed: 00:03:00 •Setting Up and Sharing Printers: 00:05:00 •AMA - Ask Me Anything about Networks and Internet Connectivity Part 1: 00:07:00 •AMA - Ask Me Anything about Networks and Internet Connectivity Part 2: 00:05:00 •Physical Security: 00:05:00 •Dealing with Malware: 00:03:00 •Password Management: 00:03:00 •Clickworthy: 00:03:00 •Perils of Public Internet: 00:02:00 •AMA - Ask Me Anything about IT Threat Mitigation Part 1: 00:07:00 •AMA - Ask Me Anything about IT Threat Mitigation Part 2: 00:08:00 •Power Management: 00:02:00 •Cleaning and Maintaining Computers: 00:02:00 •Trash it or Stash it?: 00:02:00 •AMA - Ask Me Anything about Computer Maintenance and Management: 00:11:00 •Troubleshooting 101: 00:03:00 •AMA - Ask Me Anything about Troubleshooting Computers Part 1: 00:10:00 •AMA - Ask Me Anything about Troubleshooting Computers Part 2: 00:11:00 •Introduction to Databases: 00:06:00 •Database Details: 00:06:00 •AMA - Ask Me Anything about Databases: 00:06:00 •Introduction to Programming: 00:04:00 •Programming with a PBJ Sandwich: 00:08:00 •AMA - Ask Me Anything about Programming: 00:04:00 •Assignment - IT Support Technician Training: 00:00:00

IT Support Technician Training
Delivered Online On Demand
£12

Number Base Conversion

By The Teachers Training

Unlock the secrets of number base conversion with our comprehensive course. Learn how to seamlessly transition between decimal, binary, octal, and hexadecimal systems. Master essential techniques and gain practical skills for solving complex mathematical problems with ease. Enroll now to expand your understanding of number bases and excel in various fields, from computer science to engineering.

Number Base Conversion
Delivered Online On Demand
£15

Learn Python and Ethical Hacking from Scratch

By Packt

This course is designed to help you understand the basic and advanced concepts of ethical hacking with ease. The course features interesting examples and coding activities in each video to keep you engaged and guides you effectively through writing programs to hack a system.

Learn Python and Ethical Hacking from Scratch
Delivered Online On Demand
£13.99

Ultimate Rust Crash Course

By Packt

This video course introduces you to the world of Rust programming. You'll learn about the Rust ecosystem, tools, primitive types, and control flow, and gain knowledge of how real-world applications are actually developed in Rust.

Ultimate Rust Crash Course
Delivered Online On Demand
£33.99

Educators matching "Binary"

Show all 28