Search result for Certificate in computational design Online Courses & Certifications
Get Course Alerts by Email
Massage Professional: 15 Hours, 11 Accredited Certificates
by The Ebodhi Team- 4.7
26.5 hours on-demand video
Every month, this course is a Top-5 Bestseller in the 'Massage' Category on Udemy. I have other certifications in massage, but this course is fantastic. Students must fill in and send us the completed treatment plans. Success in gaining a certificate is not guaranteed; we have a duty to protect the public against bad practice....
$49.99
Software testing training for absolute beginners
by ISTQB Foundation level- 4.2
24 hours on-demand video
Agile Level: This is one of the popular concepts in testing and much in demand in testing industries. In this course, you will understand the concepts of Agile testing. Expert level: This is the highest level in testing you can achieve. In this level, all different type of black box testing is explained with the practical requirement....
$12.99
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
With the CEH credential, you can design and govern the minimum standards necessary for credentialing information that security professionals need to engage in ethical hacking. Also after completion of the course, a certificate will be created for your arsenal. In this course, you will find the clean and pure information. This approach also can be seen in my previous course's reviews....
$17.99
The Comprehensive Personal Finance Course: Manage Money Well
by Prakash Prasad- 3.5
4 hours on-demand video
5 Course in 1! Save, Invest & Earn FAR More! By Top Award Wining Investment Banker, Financial Planner, & Personal Coach 13 costly mistakes to avoid - investing in real estate Risk associated with Investing in Precious Metal Certificate of Deposit / Fixed Deposits Benefits 5 Risk of Investing in Bonds...
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
In public key cryptography, the CA creates private and public keys using the same algorithm, but it functions asymmetrically Learn the steps to create and manage a public key infrastructure, and the relationship between public key infrastructures and certificate authority, as well as both traditional cryptography and public key cryptography, the implementation of certificates, and managing certificates....
$199.99
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
Become expert in Cyber Security | ethical hacking I can summarise all in two words. Many depend on ethical hackers to identify weaknesses in their networks, endpoints, devices, or applications. With the CEH credential, you can design and govern the minimum standards necessary for credentialing information that security professionals need to engage in ethical hacking....
$23.99
The Complete Public Speaking Certification Program (Part 1)
by Jason Teteak- 4.5
2.5 hours on-demand video
The #1 Most Powerful Public Speaking and Presentations Certification System in the World! (Beginner to Advanced) We built this course to train our own presenters, but in the spirit of “open sourcing” our business (which is what Rule the Room is all about) we’re now making this certification and training available to the world....
$14.99
Related searches
The Complete Public Speaking Certification Program (Part 3)
by Jason Teteak- 4.8
7 hours on-demand video
The #1 Most Powerful Public Speaking and Presentations Certification System in the World! (Beginner to Advanced) We built this course to train our own presenters, but in the spirit of “open sourcing” our business (which is what Rule the Room is all about) we’re now making this certification and training available to the world....
$9.99
The Complete Public Speaking Certification Program (Part 2)
by Jason Teteak- 4.4
4.5 hours on-demand video
The #1 Most Powerful Public Speaking and Presentations Certification System in the World! (Beginner to Advanced) We built this course to train our own presenters, but in the spirit of “open sourcing” our business (which is what Rule the Room is all about) we’re now making this certification and training available to the world....
$9.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
With the CEH credential, you can design and govern the minimum standards necessary for credentialing information that security professionals need to engage in ethical hacking. The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. Post Modules of Metasploit Framework (MSF)Collecting Sensitive Data in Post-Exploitation PhasePassword Cracking...
$21.99