• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

469 Courses

Payroll Management - Diploma

By Apex Learning

OVERVIEW Become an expert payroll manager, mastering the essential payroll fundamentals by attending the highly comprehensive Payroll Management - Diploma course.  This advanced Payroll Management - Diploma course aims to equip you with competitive knowledge and help you develop ultimate professional excellency to kickstart your career in the field of Payroll Management, standing out from all other applicants and employees. The course covers all fundamental areas of payroll management to provide you with the relevant skills and industry knowledge to take your career to the next level.  The course will set you up with a solid foundation in payroll management you need to get yourself job-ready! HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Payroll Management - Diploma. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Payroll Management - Diploma is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management , Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. COURSE CURRICULUM 42 sections • 40 lectures • 07:03:00 total length •Module 1: Payroll Basics: 00:10:00 •Module 2: Company Settings: 00:08:00 •Module 3: Legislation Settings: 00:07:00 •Module 4: Pension Scheme Basics: 00:06:00 •Module 5: Pay Elements: 00:14:00 •Module 6: The Processing Date: 00:07:00 •Module 7: Adding Existing Employees: 00:08:00 •Module 8: Adding New Employees: 00:12:00 •Module 9: Payroll Processing Basics: 00:11:00 •Module 10: Entering Payments: 00:12:00 •Module 11: Pre-Update Reports: 00:09:00 •Module 12: Updating Records: 00:09:00 •Module 13: e-Submissions Basics: 00:09:00 •Module 14: Process Payroll (November): 00:16:00 •Module 15: Employee Records and Reports: 00:13:00 •Module 16: Editing Employee Records: 00:07:00 •Module 17: Process Payroll (December): 00:12:00 •Module 18: Resetting Payments: 00:05:00 •Module 19: Quick SSP: 00:09:00 •Module 20: An Employee Leaves: 00:13:00 •Module 21: Final Payroll Run: 00:07:00 •Module 22: Reports and Historical Data: 00:08:00 •Module 23: Year-End Procedures: 00:09:00 •Module 01: The Outline View and Criteria: 00:11:00 •Module 02: Global Changes: 00:07:00 •Module 03: Timesheets: 00:12:00 •Module 04: Departments and Analysis: 00:11:00 •Module 05: Holiday Schemes: 00:10:00 •Module 06: Recording Holidays: 00:12:00 •Module 07: Absence Reasons: 00:13:00 •Module 08: Statutory Sick Pay: 00:16:00 •Module 09: Statutory Maternity Pay: 00:17:00 •Module 10: Student Loans: 00:09:00 •Module 11: Company Cars: 00:13:00 •Module 12: Workplace Pensions: 00:21:00 •Module 13: Holiday Funds: 00:13:00 •Module 14: Process Payroll (November): 00:11:00 •Module 15: Passwords and Access Rights: 00:08:00 •Module 16: Options and Links: 00:10:00 •Module 17: Linking Payroll to Accounts: 00:08:00

Payroll Management - Diploma
Delivered Online On Demand
£12

Sage Payroll : Essential Techniques for Efficient Payroll Processing and Compliance Course

By One Education

Pay employees precisely and on time, with tremendous speed, efficiency, and confidence! Sage accounting is the focus of our in-depth Sage Payroll course if you want to learn how to offer a central location to handle employee records, leave management, and other essential information of your personnel. If you already work in bookkeeping and accounts, have a basic understanding of manual payroll systems or none at all, but want to advance your career in this field, this comprehensive Sage Payroll course fro One Education is the perfect place for you. One of the most well-liked and in-demand courses is our one on Sage payroll. You can learn the theoretical knowledge and practical abilities required to utilize this well-known payroll software by taking this online course. You will discover how Sage Payroll automatically determines the proper wages and runs the payroll at these numbers for the future payment periods if no change in salary is reported with the aid of this in-depth course. Additionally, you will learn how to compute bonuses, leave pay, medical benefits, pensions, and wages. When required, just specify the transaction type; the rest will be calculated by payroll. Learning Outcomes: This interactive course from One Education will allow you to: * Comprehend the basic of payroll system. * Know the details of company settings, legislation settings and the basics of pension schemes. * Learn how to add new and existing employees. * Keep employee records and reports. * Deeply understand the process of November and December. * Record holidays, keep track of sick and maternity pays. * Grasp options and links, passwords and access rights, and linking to accounts. This premium online course Course ensures your professional development with CPD accreditation. You'll have the privilege of learning in your own time, at your own pace and earning an accredited certification. Sage Payroll course is developed by industry experts and is packed with several insightful modules to give you a proper understanding of the Course and allow you to accelerate your career. Meet the Accreditation The CPD Certification Service (CPD UK) assures the Sage Payroll course training and learning activities are relevant, reliable, and up to date. Why CPD UK Certification? * Achieving CPD UK certificates can help you stand out in your profession and enhance your employability prospects. * By participating in CPD activities, you can stay up-to-date with the latest industry trends and innovations, and improve your knowledge and skills. * CPD UK certificates demonstrate your commitment to continuing professional development and can lead to increased recognition and credibility within your field. Why People Love And Enrol The Course From One Education * Eligibility for an CPD-accredited certificate on successful completion of Course * Learning materials of our Course contains engaging voice-over and visual elements for your comfort * Freedom to study at your own pace * 24/7 access to the Course materials for 12 months * Full Tutor support on weekdays (Monday - Friday) Module Attributes: The course has been meticulously designed to deliver maximum information in minimum time. This approach enables learners to easily comprehend the core concepts and confidently apply them to diverse real-life scenarios. Course Curriculum: Here is a curriculum breakdown of the Course: Sage 50 Payroll For Beginners * Basics * Company Settings * Legislation Settings * Pension Scheme Basics * Pay Elements * The Processing Date * Adding Existing Employees * Adding New Employees * Entering Payments * Pre-Update Reports * Updating Records * E-Submissions Basics * Employee Records And Reports * Editing Employee Records * Resetting Payments * Quick SSP * An Employee Leaves * Reports And Historical Data * Year-End Procedures And Much More... Sage 50 Payroll Intermediate Level * The Outline View And Criteria * Global Changes * Timesheets * Departments And Analysis * Holiday Schemes * Recording Holidays * Absence Reasons * Statutory Sick Pay * Statutory Maternity Pay * Student Loans * Company Cars * Workplace Pensions * Holiday Funds * Roll Back * Passwords And Access Rights * Options And Links Method of Assessment To successfully complete the Course, students will have to take an automated multiple-choice exam. This exam will be online, and you will need to score 60% or above in order to pass. After successfully passing the exam, you will be able to apply for an CPD-accredited certificate. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by The CPD Certification Service WHO IS THIS COURSE FOR? The Course training course is ideal for highly motivated individuals who want to enhance their professional skills and train for the job they want! This Course also suits people aspiring for some in-depth knowledge on this topic and keep up to date with the latest information. Study the course today and increase your professional skillet from the comfort of your home! This course particularly recommended for- * Students * Recent graduates * Job Seekers * Anyone interested in this topic * People already working in the relevant fields and want to polish their knowledge and skill. REQUIREMENTS There are no formal entry requirements for the Course, with enrollment open to anyone! Anyone and everyone with a knack for learning can enrol on this course without any hesitation. Learn online from any internet device, including your computer, tablet or smartphone. Study when it suits you and complete the Course at your own pace. All students must have a passion for learning and literacy, as well as being over the age of 16. CAREER PATH By following this Sage Payroll course, you can explore a wide range of career options. Some of the noteworthy ones are: * Administrator (average annual salary: £24,000) * Senior Associate (average annual salary: £58544) * Book Keeper (average annual salary: £25295) * HR Admin (average annual salary: £23,000) * Executive (average annual salary: £32,500) * HR Officer (annual salary:£32,500)

Sage Payroll : Essential Techniques for Efficient Payroll Processing and Compliance Course
Delivered Online On Demand
£12

CompTIA A+ (220-1002)

By Apex Learning

OVERVIEW This comprehensive course on CompTIA A+ (220-1002) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA A+ (220-1002) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1002). It is available to all students, of all academic backgrounds. REQUIREMENTS Our CompTIA A+ (220-1002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH COURSE CURRICULUM 22 sections • 106 lectures • 14:51:00 total length •CompTIA A+ 2019 Core 2 (220-1002) Course Introduction: 00:02:00 •What is the CompTIA A+: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 2 (220-1002) Exam?: 00:04:00 •How to Pass the CompTIA A+ Exam: 00:04:00 •How to use this Video Course: 00:03:00 •Professional Communication Part 1: 00:06:00 •Professional Communication Part 2: 00:07:00 •Physical Safety: 00:07:00 •What is an Operating System?: 00:09:00 •Users and Super Users: 00:05:00 •Why Windows?: 00:08:00 •Windows Editions and Versions: 00:12:00 •Touring the macOS: 00:06:00 •Touring Linux: 00:08:00 •32-Bit vs. 64-Bit Processing: 00:12:00 •Virtual Memory: 00:06:00 •Power Protection: 00:10:00 •Understanding Partitioning: 00:04:00 •MBR Partitioning: 00:12:00 •GPT Partitioning: 00:09:00 •Understanding File Systems: 00:12:00 •Popular File Systems: 00:07:00 •Formatting in Action: 00:11:00 •Dynamic Disks: 00:09:00 •Software RAID in Storage Spaces: 00:10:00 •Encrypting Mass Storage: 00:09:00 •Boot from Everything: 00:12:00 •Installing Windows: 00:12:00 •Post-Installation Tasks: 00:12:00 •Windows Installation options: 00:07:00 •What is the Registry?: 00:11:00 •Processes: 00:07:00 •Services: 00:04:00 •Your Windows Toolset: 00:08:00 •Windows 7 Task Manager: 00:09:00 •Windows 10 Task Manager: 00:06:00 •Information and Configuration Tools: 00:11:00 •Performance Monitor: 00:12:00 •Event Viewer: 00:07:00 •Tools for Programmers: 00:08:00 •Introduction to Users and Groups: 00:06:00 •Managing Users and Groups: 00:12:00 •NTFS Permissions: 00:08:00 •Linux and macOS Permissions: 00:05:00 •File Explorer: 00:14:00 •Sharing Resources: 00:11:00 •Security Policies: 00:08:00 •Patch Management: 00:11:00 •Working with Disks: 00:06:00 •Working with Applications: 00:07:00 •System Restore: 00:05:00 •Backing up Your Files: 00:07:00 •Task Scheduler: 00:07:00 •Understanding the CLI: 00:11:00 •Navigating the CLI: 00:14:00 •Working with Folders: 00:07:00 •Working with Files: 00:11:00 •Working with Drives: 00:13:00 •Super Copy Commands: 00:09:00 •Advanced Windows Command Line: 00:08:00 •Advanced Linux Commands: 00:13:00 •Command-Line Permissions: 00:08:00 •Introduction to Scripting: 00:10:00 •Interpreted Languages: 00:12:00 •Windows Recovery Environment: 00:05:00 •Advanced Windows Startup Options: 00:07:00 •Troubleshooting Boot Problems: 00:10:00 •Troubleshooting at the GUI: 00:11:00 •Troubleshooting Applications: 00:07:00 •Kernel Panic: 00:05:00 •Resolutions and Aspect Ratios: 00:06:00 •Multiple Monitors: 00:05:00 •Network Card Troubleshooting: 00:09:00 •Working with Connections: 00:09:00 •Working with Workgroups: 00:08:00 •Working with Active Directory: 00:14:00 •Windows Sharing with Mac and LInux: 00:07:00 •Net Command: 00:04:00 •Firewall Configuration: 00:11:00 •Windows Firewall: 00:08:00 •Port Forwarding: 00:07:00 •Wireless Encryption: 00:11:00 •Enterprise Wireless: 00:16:00 •Telnet and SSH: 00:07:00 •Remote Desktop Connections: 00:06:00 •The World Wide Web: 00:09:00 •Troubleshooting Internet Connections: 00:07:00 •Power Management: 00:11:00 •Mobile Device Security: 00:08:00 •Mobile Security Troubleshooting: 00:06:00 •Mobile Device Troubleshooting: 00:10:00 •Threats: 00:10:00 •Physical Security: 00:08:00 •Passwords and Authentication: 00:14:00 •Malware: 00:14:00 •Anti-Malware: 00:11:00 •Social Engineering: 00:06:00 •Licensing: 00:10:00 •Incident Response: 00:05:00 •Environmental Controls: 00:06:00 •Documents You Need to Know: 00:09:00 •Data You Need to Know: 00:04:00 •Change Management: 00:06:00 •The Zen of Backup: 00:11:00 •Recycling and Data Destruction: 00:07:00

CompTIA A+ (220-1002)
Delivered Online On Demand
£12

Learn Ethical Hacking From A-Z: Beginner To Expert

By Apex Learning

OVERVIEW This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand
£12

Sage 50 Payroll Level 3 Diploma

By NextGen Learning

Ignite your dynamic career and strengthen your deep insight knowledge by signing up for Sage 50 Payroll 2022. This course is the ideal approach for you to obtain a thorough understanding and knowledge of the subject. We are concerned about the progression of your career. Therefore, after conducting extensive studies and consulting with experienced personnel, we formulated this outstanding Sage 50 Payroll 2022 course to improve your pertinent skills. In this easy-to-digest course, you will get exclusive training, which will enable you to stand out in this competitive market. However, the course covers all of the recent materials in order to keep you up to date with the job market and make you a good fit for your career. This top-notch Sage 50 Payroll 2022 course curriculum comprises basic to advanced levels of modules that will increase your skill sets. After completing this programme, you will attain the productivity to succeed in your organisation. So, if you are eager to see yourself in a gratifying career, then enrol in the course today! What will Make You Stand Out? On completion of this Sage 50 Payroll 2022 online course, you will gain: * CPD QS Accredited course * After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. * Lifetime access to the whole collection of learning materials. * Enroling in the Course has no additional cost. * 24x7 Tutor Support * You can study and complete the course at your own pace. Course Curriculum : Sage 50 Payroll 2022 Sage 50 Payroll For Beginners * Module 1: Payroll Basics * Module 2: Company Settings * Module 3: Legislation Settings * Module 4: Pension Scheme Basics * Module 5: Pay Elements * Module 6: The Processing Date * Module 7: Adding Existing Employees * Module 8: Adding New Employees * Module 9: Payroll Processing Basics * Module 10: Entering Payments * Module 11: Pre-Update Reports * Module 12: Updating Records * Module 13: E-Submissions Basics * Module 14: Process Payroll (November) * Module 15: Employee Records And Reports * Module 16: Editing Employee Records * Module 17: Process Payroll (December) * Module 18: Resetting Payments * Module 19: Quick SSP * Module 20: An Employee Leaves * Module 21: Final Payroll Run * Module 22: Reports And Historical Data * Module 23: Year-End Procedures Sage 50 Payroll Intermediate Level * Module 1: The Outline View And Criteria * Module 2: Global Changes * Module 3: Timesheets * Module 4: Departments And Analysis * Module 5: Holiday Schemes * Module 6: Recording Holidays * Module 7: Absence Reasons * Module 8: Statutory Sick Pay * Module 9: Statutory Maternity Pay * Module 10: Student Loans * Module 11: Company Cars * Module 12: Workplace Pensions * Module 13: Holiday Funds * Module 14: Roll Back * Module 15: Passwords And Access Rights * Module 16: Options And Links * Module 17: Linking Payroll To Accounts Show off your new skills with a certificate of completion. After successfully completing the course, you can order your CPD Accredited Certificates as proof of your achievement absolutely free. Please Note: The delivery charge inside the U.K. is £4.99, and international students have to pay £8.99. CPD 10 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? Is This Course the Right Option for You? This Sage 50 Payroll 2022 course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. REQUIREMENTS Without any formal requirements, you can delightfully enrol in this Sage 50 Payroll 2022 course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this course at your own pace. CAREER PATH The aim of this exclusive Sage 50 Payroll 2022 course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Sage 50 Payroll  Level 3 Diploma
Delivered Online On Demand
£12

Cyber Security Awareness

By Course Cloud

Dive into the digital world safely with our Cyber Security course! In today's fast-paced world, staying safe online is more important than ever.

Cyber Security Awareness
Delivered Online On Demand
£4.99 to £5.99

Cyber Security Essentials

5.0(1)

By LearnDrive UK

Our goal is to teach cybersecurity to beginners who want a deeper understanding of the topic.

Cyber Security Essentials
Delivered Online On Demand
£5

Network Automation with Python and Ansible

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. DAY 1 ? CRITICAL PYTHON CATCHUP & REVIEW * Overview of Python and Ansible * Python white space rules & best practices * Printing and more Printing * Date types and Variables * Packing and Unpacking Variables * f Strings * Conditional expressions * Relational and Boolean operators * Lists, Tuples, Dictionaries * Indexing and slicing * Built-in functions * Iterating with Loops (for and while) * Working with files * Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) * Using Python to access REST interfaces * Working with JSON * Python, Ansible and Paramiko * Using Paramiko to SSH with keys and passwords * RESTful API review * API keys * Paramiko Review * Using Paramiko to SFTP with keys and passwords DAY 02 ? PYTHON AND NETWORK AUTOMATION * Introduction to Netmiko (automating routers and switches) * Using Netmiko to send commands to / from network devices * Working with YAML * Converting JSON to YAML with Python * Ansible keywords * YAML and JSON for data exchange * Ansible and YAML * Ansible Playbook components * Tying together Python and Ansible ? Using Python within Ansible * Ansible Network Modules * What is new in Ansible (most current updates / release notes) * Network Agnostic modules * Writing network playbooks * Reviewing the construction of network playbooks * Writing Ansible playbooks that respond to network failures DAY 03 ? BLENDING PYTHON AND ANSIBLE SKILLSETS * Review how to use Python within Ansible * Calling Python scripts with Ansible * Jinja2 Templating Engine for Python (and Ansible) * Using Templates in Ansible playbooks * Jinja2 filters, looping, and other useful tricks for automating with Ansible * Playbook tagging for selective runs * When to use Python and when to use Ansible * ?Big Picture? options for using Python & Ansible within your Network Ansible Roles DAY 04 ? CUSTOMIZING ANSIBLE WITH PYTHON * Review ? Running Scripts with Ansible * Prompting for Ansible user input * Ansible Galaxy & Getting at Roles * Writing a custom Ansible Module with Python * Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. * Case Study: Automate your Enterprise Network * When to use Python and when to use Ansible * Writing your own Ansible modules in Python * ?Big Picture? options for using Python & Ansible within your Network * Overview ? NETCONF / YANG and what they mean for Python and Ansible * Molecule ? Testing your roles ADDITIONAL COURSE DETAILS: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Network Automation with Python and Ansible
Delivered on-request, onlineDelivered Online
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA'S SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS) * The motivations behind STIGs * Requirements that the various software development roles must meet * Implementing STIG requirements and guidelines WHY HUNT BUGS? * The Language of CyberSecurity * The Changing Cybersecurity Landscape * AppSec Dissection of SolarWinds * The Human Perimeter * Interpreting the 2021 Verizon Data Breach Investigation Report * First Axiom in Web Application Security Analysis * First Axiom in Addressing ALL Security Concerns * Lab: Case Study in Failure SAFE AND APPROPRIATE BUG HUNTING/HACKING * Working Ethically * Respecting Privacy * Bug/Defect Notification * Bug Bounty Programs * Bug Hunting Mistakes to Avoid PRINCIPLES OF INFORMATION SECURITY * Secuity Is a Lifecycle Issue * Minimize Attack Surface Area * Layers of Defense: Tenacious D * Compartmentalize * Consider All Application States * Do NOT Trust the Untrusted IDENTIFICATION AND AUTHENTICATION FAILURES * Applicable STIGs * Quality and Protection of Authentication Data * Proper hashing of passwords * Handling Passwords on Server Side * Session Management * HttpOnly and Security Headers * Lab: STIG Walk-Throughs INJECTION * Applicable STIGs * Injection Flaws * SQL Injection Attacks Evolve * Drill Down on Stored Procedures * Other Forms of Server-Side Injection * Minimizing Injection Flaws * Client-side Injection: XSS * Persistent, Reflective, and DOM-Based XSS * Best Practices for Untrusted Data * Lab: STIG Walk-Throughs APPLICATIONS: WHAT NEXT? * Common Vulnerabilities and Exposures * CWE/SANS Top 25 Most Dangerous SW Errors * Strength Training: Project Teams/Developers * Strength Training: IT Organizations CRYPTOGRAPHIC FAILURES * Applicable STIGs * Identifying Protection Needs * Evolving Privacy Considerations * Options for Protecting Data * Transport/Message Level Security * Weak Cryptographic Processing * Keys and Key Management * Threats of Quantum Computing * Steal Now, Crack Later Threat * Lab: STIG Walk-Throughs APPLICATION SECURITY AND DEVELOPMENT CHECKLISTS * Checklist Overview, Conventions, and Best Practices * Leveraging Common AppSec Practices and Control * Actionable Application Security * Additional Tools for the Toolbox * Strength Training: Project Teams/Developers * Strength Training: IT Organizations * Lab: Recent Incidents SDL OVERVIEW * Attack Phases: Offensive Actions and Defensive Controls * Secure Software Development Processes * Shifting Left * Actionable Items Moving Forward * Lab: Design Study Review ASSET ANALYSIS * Asset Analysis Process * Types of Application-Related Assets * Adding Risk Escalators * Discovery and Recon DESIGN REVIEW * Asset Inventory and Design * Assets, Dataflows, and Trust Boundaries * Risk Escalators in Designs * Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered on-request, onlineDelivered Online
Price on Enquiry

CyberSAFE: Staying Safe in a Digital World

By Nexus Human

Duration 0.25 Days 1.5 CPD hours This course is intended for This course is intended for individuals who want to learn how to stay safe online. Overview Upon successful completion of this course, students will be able to understand how to avoid social engineering and stay safe online. In this course, students will learn how to use the internet safely, and learn traps to avoid. THE NEED FOR SECURITY * Compliance Recognize social engineering and other attacks SECURE DEVICES * Passwords Identify viruses and malware USE THE INTERNET SAFELY * Browsing the web Email Social media Cloud services ADDITIONAL COURSE DETAILS: Nexus Humans CyberSAFE: Staying Safe in a Digital World training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CyberSAFE: Staying Safe in a Digital World course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CyberSAFE: Staying Safe in a Digital World
Delivered on-request, onlineDelivered Online
Price on Enquiry