• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

687 JavaScript courses

From Data to Insights with Google Cloud Platform

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform Overview This course teaches students the following skills: Derive insights from data using the analysis and visualization tools on Google Cloud Platform Interactively query datasets using Google BigQuery Load, clean, and transform data at scale Visualize data using Google Data Studio and other third-party platforms Distinguish between exploratory and explanatory analytics and when to use each approach Explore new datasets and uncover hidden insights quickly and effectively Optimizing data models and queries for price and performance Want to know how to query and process petabytes of data in seconds? Curious about data analysis that scales automatically as your data grows? Welcome to the Data Insights course! This four-course accelerated online specialization teaches course participants how to derive insights through data analysis and visualization using the Google Cloud Platform. The courses feature interactive scenarios and hands-on labs where participants explore, mine, load, visualize, and extract insights from diverse Google BigQuery datasets. The courses also cover data loading, querying, schema modeling, optimizing performance, query pricing, and data visualization. This specialization is intended for the following participants: Data Analysts, Business Analysts, Business Intelligence professionals Cloud Data Engineers who will be partnering with Data Analysts to build scalable data solutions on Google Cloud Platform To get the most out of this specialization, we recommend participants have some proficiency with ANSI SQL. INTRODUCTION TO DATA ON THE GOOGLE CLOUD PLATFORM * Highlight Analytics Challenges Faced by Data Analysts * Compare Big Data On-Premises vs on the Cloud * Learn from Real-World Use Cases of Companies Transformed through Analytics on the Cloud * Navigate Google Cloud Platform Project Basics * Lab: Getting started with Google Cloud Platform BIG DATA TOOLS OVERVIEW * Walkthrough Data Analyst Tasks, Challenges, and Introduce Google Cloud Platform Data Tools * Demo: Analyze 10 Billion Records with Google BigQuery * Explore 9 Fundamental Google BigQuery Features * Compare GCP Tools for Analysts, Data Scientists, and Data Engineers * Lab: Exploring Datasets with Google BigQuery EXPLORING YOUR DATA WITH SQL * Compare Common Data Exploration Techniques * Learn How to Code High Quality Standard SQL * Explore Google BigQuery Public Datasets * Visualization Preview: Google Data Studio * Lab: Troubleshoot Common SQL Errors GOOGLE BIGQUERY PRICING * Walkthrough of a BigQuery Job * Calculate BigQuery Pricing: Storage, Querying, and Streaming Costs * Optimize Queries for Cost * Lab: Calculate Google BigQuery Pricing CLEANING AND TRANSFORMING YOUR DATA * Examine the 5 Principles of Dataset Integrity * Characterize Dataset Shape and Skew * Clean and Transform Data using SQL * Clean and Transform Data using a new UI: Introducing Cloud Dataprep * Lab: Explore and Shape Data with Cloud Dataprep STORING AND EXPORTING DATA * Compare Permanent vs Temporary Tables * Save and Export Query Results * Performance Preview: Query Cache * Lab: Creating new Permanent Tables INGESTING NEW DATASETS INTO GOOGLE BIGQUERY * Query from External Data Sources * Avoid Data Ingesting Pitfalls * Ingest New Data into Permanent Tables * Discuss Streaming Inserts * Lab: Ingesting and Querying New Datasets DATA VISUALIZATION * Overview of Data Visualization Principles * Exploratory vs Explanatory Analysis Approaches * Demo: Google Data Studio UI * Connect Google Data Studio to Google BigQuery * Lab: Exploring a Dataset in Google Data Studio JOINING AND MERGING DATASETS * Merge Historical Data Tables with UNION * Introduce Table Wildcards for Easy Merges * Review Data Schemas: Linking Data Across Multiple Tables * Walkthrough JOIN Examples and Pitfalls * Lab: Join and Union Data from Multiple Tables ADVANCED FUNCTIONS AND CLAUSES * Review SQL Case Statements * Introduce Analytical Window Functions * Safeguard Data with One-Way Field Encryption * Discuss Effective Sub-query and CTE design * Compare SQL and Javascript UDFs * Lab: Deriving Insights with Advanced SQL Functions SCHEMA DESIGN AND NESTED DATA STRUCTURES * Compare Google BigQuery vs Traditional RDBMS Data Architecture * Normalization vs Denormalization: Performance Tradeoffs * Schema Review: The Good, The Bad, and The Ugly * Arrays and Nested Data in Google BigQuery * Lab: Querying Nested and Repeated Data MORE VISUALIZATION WITH GOOGLE DATA STUDIO * Create Case Statements and Calculated Fields * Avoid Performance Pitfalls with Cache considerations * Share Dashboards and Discuss Data Access considerations OPTIMIZING FOR PERFORMANCE * Avoid Google BigQuery Performance Pitfalls * Prevent Hotspots in your Data * Diagnose Performance Issues with the Query Explanation map * Lab: Optimizing and Troubleshooting Query Performance ADVANCED INSIGHTS * Introducing Cloud Datalab * Cloud Datalab Notebooks and Cells * Benefits of Cloud Datalab DATA ACCESS * Compare IAM and BigQuery Dataset Roles * Avoid Access Pitfalls * Review Members, Roles, Organizations, Account Administration, and Service Accounts

From Data to Insights with Google Cloud Platform
Delivered on-request, onlineDelivered Online
Price on Enquiry

Become An Ethereum Blockchain Developer

By Packt

Discover Ethereum blockchain development with our comprehensive course. From the fundamentals of Solidity to advanced topics such as NFTs and Truffle, we will gain practical skills through hands-on projects. Whether a beginner or an experienced developer, this course equips us with the tools and knowledge to excel in Ethereum blockchain development.

Become An Ethereum Blockchain Developer
Delivered Online On Demand
£67.99

Data Analysis with Pandas and Python

By Packt

This course offers an immersive experience in data analysis, guiding you from initial setup with Python and Pandas, through series and DataFrame manipulation, to advanced data visualization techniques. Perfect for enhancing your data handling and analysis skills.

Data Analysis with Pandas and Python
Delivered Online On Demand
£67.99

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! WHAT YOU'LL LEARN * Install hacking lab & needed software (works on Windows, OS X and Linux). * Discover, exploit and mitigate a number of dangerous vulnerabilities. * Use advanced techniques to discover and exploit these vulnerabilities. * Bypass security measurements and escalate privileges. * Intercept requests using a proxy. * Hack all websites on same server. * Bypass filters and client-side security * Adopt SQL queries to discover and exploit SQL injections in secure pages * Gain full control over target server using SQL injections * Discover & exploit blind SQL injections * Install Kali Linux - a penetration testing operating system * Install windows & vulnerable operating systems as virtual machines for testing * Learn linux commands and how to interact with the terminal * Learn linux basics * Understand how websites & web applications work * Understand how browsers communicate with websites * Gather sensitive information about websites * Discover servers, technologies and services used on target website * Discover emails and sensitive data associated with a specific website * Find all subdomains associated with a website * Discover unpublished directories and files associated with a target website * Find all websites hosted on the same server as the target website * Discover, exploit and fix file upload vulnerabilities * Exploit advanced file upload vulnerabilities & gain full control over the target website * Discover, exploit and fix code execution vulnerabilities * Exploit advanced code execution vulnerabilities & gain full control over the target website * Discover, exploit & fix local file inclusion vulnerabilities * Exploit advanced local file inclusion vulnerabilities & gain full control over the target website * Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website * Discover, fix, and exploit SQL injection vulnerabilities * Bypass login forms and login as admin using SQL injections * Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections * Bypass filtering, and login as admin without password using SQL injections * Bypass filtering and security measurements * Read / Write files to the server using SQL injections * Patch SQL injections quickly * Learn the right way to write SQL queries to prevent SQL injections * Discover basic & advanced reflected XSS vulnerabilities * Discover basic & advanced stored XSS vulnerabilities * Discover DOM-based XSS vulnerabilities * How to use BeEF framwork * Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities * Steal credentials from hooked victims * Run javascript code on hooked victims * Create an undetectable backdoor * Hack into hooked computers and gain full control over them * Fix XSS vulnerabilities & protect yourself from them as a user * What do we mean by brute force & wordlist attacks * Create a wordlist or a dictionary * Launch a wordlist attack and guess admin's password * Discover all of the above vulnerabilities automatically using a web proxy * Run system commands on the target webserver * Access the file system (navigate between directories, read/write files) * Download, upload files * Bypass security measurements * Access all websites on the same webserver * Connect to the database and execute SQL queries or download the whole database to the local machine REQUIREMENTS * Basic IT Skills * No Linux, programming or hacking knowledge required. * Computer with a minimum of 4GB ram/memory * Operating System: Windows / OS X / Linux WHO THIS COURSE IS FOR: * Anybody who is interested in learning website & web application hacking / penetration testing * Anybody who wants to learn how hackers hack websites * Anybody who wants to learn how to secure websites & web applications from hacker * Web developers so they can create secure web application & secure their existing ones * Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand
£25

The Ultimate Guide to Python Programming with Python 3.10

By Packt

Master Python 3.10 from the experts with this course and demonstrate programming wizardry in Python. Go from a geek to a wizard in no time with this well-structured video course and write Python code like a pro. Learn about the often-forgotten basics and special features of programming and Python in general.

The Ultimate Guide to Python Programming with Python 3.10
Delivered Online On Demand
£82.99

Learn Automation Testing with Java and Selenium Webdriver

By Packt

In this course, you will learn how to write great automation tests with Selenium WebDriver and Java, and start building automation testing frameworks!

Learn Automation Testing with Java and Selenium Webdriver
Delivered Online On Demand
£63.99

Agile Project Management

By Packt

This course is your one stop destination for everything you need to know about Agile Project Management. The course covers core concepts of Agile Scrum, Product ownership, Business analysis, Project delivery, Using User stories and Agile Kanban Productivity and Efficiency. All examples and facts are based on real industry experience and research.

Agile Project Management
Delivered Online On Demand
£56.99

The Complete Ethical Hacking Course

By Packt

If you are a newbie in the field of ethical hacking or want to become an ethical hacker, this course is just what will get you started. This is a comprehensive course with real-world examples to help you understand the fundamentals of hacking and cyber security.

The Complete Ethical Hacking Course
Delivered Online On Demand
£29.99

App Development Training: React and Redux

5.0(1)

By Course Gate

The aim of this App Development Training: React and Redux is to teach you the core concepts of React to make you an efficient UI designer. The course covers everything that is needed to build rich applications. Implementing the necessary functionality and logic to at least start a very interesting side project, but quite possibly even the first version of an online business. You will learn React from the ground up. You'll be able to use Redux Framework to take React to the next level. By the end of the course, you will be able to join existing React projects and start developing features. WHO IS THIS COURSE FOR? App Development Training: React and Redux is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. REQUIREMENTS Our App Development Training: React and Redux is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD CERTIFICATE FROM COURSE GATE  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. CAREER PATH This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. COURSE CURRICULUM Getting Started VS Code Setup 00:03:00 How to get source code for each lecture 00:01:00 Create React App using create-react-app cli 00:02:00 Creating Nested React Elements 00:08:00 Creating Nested Elements in React 00:08:00 How React uses React Elements to Create Virtual DOM 00:01:00 What is DOM 00:03:00 What is Virtual DOM 00:05:00 Create Nested Components in React 00:05:00 Creating Components in React 00:06:00 Adding Props Validations in React Component 00:03:00 Create Nested Components in React 00:05:00 Create State in React Component 00:08:00 Update State using events and custom methods 00:08:00 Iterate Array and render the components 00:06:00 Pass function as props from Parent to Child Componenty 00:09:00 Convert React Components to JSX 00:09:00 Module Summary 00:01:00 Data Flow in React Components State in React Component 00:05:00 Shallow Merging with setState 00:06:00 Use props, PropTypes and defaultProps in React Component 00:06:00 Communicate with Parent and Child Component 00:07:00 Module Summary 00:01:00 Component LifeCycle Methods in React What are LifeCycle Methods in React Component 00:01:00 Types and Phases of LifeCycle Methods 00:04:00 LifeCycle Mounting Methods in Action 00:09:00 LifeCycle Updating Methods in Action 00:07:00 Error Handling with component Did Catch 00:08:00 Hacker news App - Building Components Setup React Application 00:03:00 Add Bootstrap to React Application 00:01:00 Create Mock Restful API with Json-Server 00:07:00 Send HTTP Request in React using axios 00:06:00 Iterate Array and render the components 00:06:00 Add Bootstrap Card to render List Items 00:07:00 Creating Header Component 00:06:00 Error Handling with Custom Error Message Component 00:07:00 Adding Loading Spinner 00:04:00 React Context API Introduction to React Context API 00:04:00 React Context API in Action 00:16:00 Create Reducer to update the State in React Context 00:09:00 Create new Action to Handle Errors 00:02:00 Working with Forms in React Creating Controlled Component 00:03:00 Adding State to the Form 00:06:00 Save new record by sending Http Request 00:14:00 Creating Reusable Component for Input FormControl 00:07:00 Adding Form Validations in React and Bootstrap 00:08:00 Add Routing in React using React-Router Add Link Navigations using React-Router 00:04:00 Redirect after submitted new Record 00:01:00 Creating Not Found Component 00:02:00 Creating new Component to Edit the Record 00:14:00 State Management with Redux Setting up Redux into React application 00:10:00 Connect React Component to Redux 00:07:00 Delete the Record from the Redux Store 00:07:00 Add Record to Redux Store 00:05:00 Consuming Http Rest API using Async Action Creators Create Async Action to fetch records from the API 00:07:00 Create Async Action to delete records from the API 00:01:00 Create Async Action to add new Record 00:01:00 Async Action to fetch single record 00:09:00 Async Action to update the Link 00:04:00 Integrating React and Redux with Firebase Creating Database on Firebase 00:04:00 Fetching data from firebase collection in react component 00:12:00 Delete document from firebase collection with react 00:04:00 Add document in firebase collection with react 00:03:00 Update document from firebase collection 00:12:00 Firebase Authentication with React and Redux User Registration in React and Firebase 00:09:00 Logout User 00:15:00 User Login with Firebase and React 00:04:00 Apply Authentication on private Routes 00:07:00 Display error notification in React 00:06:00 Deploy React Application to Firebase 00:05:00 Bonus: ES6 crash course Var Scoping 00:04:00 Understanding let 00:01:00 Examples of const 00:01:00 More use cases of let and const 00:04:00 Introduction to Arrow functions 00:02:00 Examples on Arrow functions 00:03:00 Destructring Objects 00:04:00 Destructring Arrays 00:03:00 Destructring Function Arguments 00:02:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

App Development Training: React and Redux
Delivered Online On Demand
£11.99

Python for Beginners - Start to Code with Python

By Packt

In this course, we will learn the basics of coding in Python by understanding the fundamentals of coding with Python, exploring some code examples, and working on three simple Python projects. This course is designed for beginners; however, basic programming understanding is required.

Python for Beginners - Start to Code with Python
Delivered Online On Demand
£41.99