- C++ Inheritance test _ C++ Practice Test _ Studytonight
- C++ Polymorphism Concepts test _ C++ Practice Test – Studytonight
- Classes, Inheritance and basic OOPS concept Test _ C++ Practice Test _ Studytonight
- Core Concepts of C++ test _ C++ Practice Test _ Studytonight
- DataTypes, String function, and Expression evaluation Interview Question MCQ _ C++ Practice Test _ Studytonight
- Introduction to C++ test _ C++ Practice Test _ Studytonight

Intermediate:

- C++ Programming MCQs Test 1 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 10 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 2 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 3 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 4 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 5 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 6 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 7 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 8 _ Online C++ Programming Test – Studytonight
- C++ Programming MCQs Test 9 _ Online C++ Programming Test – Studytonight

Exercise 1: Open Source Information Gathering Using Windows Command Line Utilities Exercise 2: Collecting Information About a Target Website Using Firebug Exercise 3: Mirroring Website Using HTTrack Web Site Copier Exercise 4: Advanced Network Route Tracing Using Path Analyzer Pro Exercise 5: Information Gathering Using Metasploit

Module 03 Scanning Networks

Exercise 1: UDP and TCP Packet Crafting Techniques using HPING3 Exercise 2: Scanning The Network Using The Colasoft Packet Builder Exercise 3: Basic Network Troubleshooting Using MegaPing Exercise 4: Understanding Network Scanning Using Nmap Exercise 5: Exploring Various Network Scanning Techniques Exercise 6: Scanning a Network Using NetScan Tools Pro Exercise 7: Avoiding Scanning Detection using Multiple Decoy IP Addresses Exercise 8: Drawing Network Diagrams Using Network Topology Mapper Exercise 9: Checking for Live Systems Using Angry IP Scanner Exercise 10: Scanning for Network Traffic Going Through a Computer’s Adapter Using IP-Tools Exercise 11: Identify Target System OS with TTL and TCP Window Sizes using Wireshark

Module 04 Enumeration

Exercise 1: NetBIOS Enumeration Using Global Network Inventory Exercise 2: Enumerating Network Resources Using Advanced IP Scanner Exercise 3: Performing Network Enumeration Using SuperScan Exercise 4: Enumerating Resources in a Local Machine Using Hyena Exercise 5: Performing Network Enumeration Using NetBIOS Enumerator Exercise 6: Enumerating a Network Using SoftPerfect Network Scanner Exercise 7: Enumerating a Target Network using Nmap and Net Use Exercise 8: Enumerating Services on a Target Machine Exercise 9: SNMP Enumeration Using snmp_enum Exercise 10: LDAP Enumeration Using Active Directory Explorer (ADExplorer) Exercise 11: Enumerating information from Windows and Samba host using Enum4linux

Module 05 Vulnerability Analysis

Exercise 1: Vulnerability Analysis Using Nessus Exercise 2: CGI Scanning with Nikto

Module 06 System Hacking

Exercise 1: Dumping and Cracking SAM Hashes to Extract Plaintext Passwords Exercise 2: Creating and Using Rainbow Tables Exercise 3: Auditing System Passwords Using L0phtCrack Exercise 4: Exploiting Client Side Vulnerabilities and Establishing a VNC Session Exercise 5: Escalating Privileges by Exploiting Client Side Vulnerabilities Exercise 6: Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpreter Exercise 7: User System Monitoring and Surveillance Using Spytech SpyAgent Exercise 8: Web Activity Monitoring and Recording using Power Spy Exercise 9: Hiding Files Using NTFS Streams Exercise 10: Hiding Data Using White Space Steganography Exercise 11: Image Steganography Using OpenStego Exercise 12: Image Steganography Using Quick Stego Exercise 13: Viewing, Enabling, and Clearing Audit Policies Using Auditpol Exercise 14: Covert Channels using Covert_TCP Exercise 15: Hacking Windows Server 2012 with a Malicious Office Document Using TheFatRat Exercise 16: Active Online Attack using Responder

Module 07 Malware Threats

Exercise 1: Creating an HTTP Trojan and Remotely Controlling a Target Machine Using HTTP RAT Exercise 2: Creating a Trojan Server Using the GUI Trojan MoSucker Exercise 3: Gaining Control over a Victim Machine Using njRAT Exercise 4: Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Various Anti-Virus Programs Exercise 5: Creating a Server Using the ProRat Tool Exercise 6: Creating a Trojan Server Using Theef Exercise 7: Creating a Virus Using the JPS Virus Maker Tool Exercise 8: Creating a Worm Using Internet Worm Maker Thing Exercise 9: Virus Analysis using IDA Exercise 10: Virus Analysis Using OllyDbg Exercise 11: Detecting Trojans Exercise 12: Monitoring TCP/IP Connections Using the CurrPorts Exercise 13: Removing Malware using Clamwin Exercise 14: Performing Registry Entry Monitoring Exercise 15: Startup Program Monitoring Tool

Module 08 Sniffing

Exercise 1: Sniffing Passwords using Wireshark Exercise 2: Analyzing a Network Using Capsa Network Analyzer Exercise 3: Spoofing MAC Address Using SMAC Exercise 4: Performing Man-in-the-Middle Attack using Cain & Abel Exercise 5: Detecting ARP Poisoning in a Switch Based Network Exercise 6: Detecting ARP Attacks with XArp Tool

Module 09 Social Engineering

Exercise 1: Sniffing Website Credentials Using Social Engineering Toolkit (SET)

Module 10 Denial-of-Service

Exercise 1: SYN Flooding a Target Host Using Metasploit Exercise 2: SYN Flooding a Target Host Using hping3 Exercise 3: Performing Distributed Denial of Service Attack Using HOIC

Module 11 Session Hijacking

Exercise 1: Session Hijacking Using the Zed Attack Proxy (ZAP)

Module 12 Evading IDS Firewalls and Honeypots

Exercise 1: Detecting Intrusions Using Snort Exercise 2: Detecting Malicious Network Traffic Using HoneyBOT Exercise 3: Bypassing Windows Firewall Using Nmap Evasion Techniques Exercise 4: Bypassing Firewall Rules Using HTTP/FTP Tunneling Exercise 5: Bypassing Windows Firewall using Metasploit

Module 13 Hacking Web Servers

Exercise 1: Performing Web Server Reconnaissance using Skipfish Exercise 2: Footprinting a Web Server Using the httprecon Tool Exercise 3: Footprinting a Web Server Using ID Serve Exercise 4: Cracking FTP Credentials Using Dictionary Attack Exercise 5: Uniscan Web Server Fingerprinting in Kali Linux

Module 14 Hacking Web Applications

Exercise 1: Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications Exercise 2: Enumerating and Hacking a Web Application Using WPScan and Metasploit Exercise 3: Exploiting Remote Command Execution Vulnerability to Compromise a Target Web Server Exercise 4: Auditing Web Application Framework Using Vega Exercise 5: Website Vulnerability Scanning Using Acunetix WVS Exercise 6: Exploiting File Upload Vulnerability at Different Security Levels Exercise 7: Performing Cross-Site Request Forgery (CSRF) Attack

Module 15 SQL Injection

Exercise: 1 SQL Injection Attacks on an MS SQL Database Exercise: 2 Scanning Web Applications Using N-Stalker Tool Exercise: 3 Performing SQL Injection attack against MSSQL to extract Databases and WebShell using SQLMAP

Module 16 Hacking Wireless Networks

Exercise: 1 WiFi Packet Analysis using Wireshark Exercise: 2 Cracking a WEP with Aircrack-ng Exercise: 3 Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng

Module 17 Hacking Mobile Platforms

Exercise: 1 Creating Binary Payloads using Kali Linux to Hack Android Exercise: 2 Harvesting Users’ Credentials Using the Social Engineering Toolkit

Module 19 Cloud Computing

Exercise: 1 Creating User Accounts and Assigning User Rights in ownCloud Exercise: 2 Securing ownCloud from Malicious File uploads using ClamAV Exercise: 3 Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux Exercise: 4 Implementing DoS Attack on Linux Cloud Server Using Slowloris Script

Module 20 Cryptography

Exercise 1: Calculating One-Way Hashes Using HashCalc Exercise 2: Calculating MD5 Hashes Using MD5 Calculator Exercise 3: Understanding File and Text Encryption Using CryptoForge Exercise 4: Encrypting and Decrypting the Data Using BCTextEncoder Exercise 5: Creating and Using Self-Signed Certificate Exercise 6: Basic Disk Encryption Using VeraCrypt Exercise 7: Basic Data Encryption Using CrypTool]]>

The objective of the lab is to extract information about the target organization that includes, but is not limited to:

- Internet Protocol (IP) address and IP range associated with the target
- Purpose of organization and why it exists
- Size of the organization
- Class of its IP block
- People and contacts at the target
- Types of operating systems (OS) and network topology in use
- Type of firewall implemented, either hardware or software or combination
- Type of remote access used, either SSH or VPN

Module 03 – Scanning Networks

The objective of this lab is to help students in conducting network scanning, port scanning, analyzing the network vulnerabilities, and so on.

You need to perform a network scan to:

- Check live systems and open ports
- Perform banner grabbing and OS fingerprinting
- Identify network vulnerabilities
- Draw network diagrams of vulnerable hosts

Module 04 – Enumeration

The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:

- User name and user groups
- Lists of computers, their operating systems, and ports
- Machine names, network resources, and services
- Lists of shares on individual hosts on the network
- Policies and passwords

Module 05 – Vulnerability Analysis

The objective of this lab is to help students in conducting vulnerability scanning, analyzing the network vulnerabilities, and so on.

You need to perform a network scan to:

- Check live systems and open ports
- Perform banner grabbing and OS fingerprinting
- Identify network vulnerabilities
- Draw network diagrams of vulnerable hosts

Module 06 – System Hacking

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files.

The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include:

- Extracting administrative passwords
- Hiding files and extracting hidden files
- Recovering passwords
- Monitoring a system remotely

Module 07 – Malware Threats

The objective of this lab includes:

- Creating and using different types of malware, such as Trojans, Viruses, and Worms, and exploiting a target machine as proof of concept
- Detecting malware

Module 08 – Sniffing

The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network.

The primary objectives of this lab are to:

- Sniff the network
- Analyze incoming and outgoing packets
- Troubleshoot the network for performance
- Secure the network from attacks

Module 09 – Social Engineering

The objective of this lab is to:

- Perform Credential Harvesting

Module 10 – Denial-of-Service

The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws.

In this lab, you will:

- Perform a DoS attack by sending a large number of SYN packets continuously
- Perform a HTTP flooding attack
- Perform a DDoS attack
- Detect and analyze DoS attack traffic

Module 11 – Session Hijacking

The objective of this lab is to help students learn session hijacking and take over a user account.

In this lab, you will:

- Intercept the Traffic between server and client
- Attain a user session by intercepting the traffic
- Perform ARP Poisoning using Cain & Abel
- Modify Cookies and Hijack a session using Firebug

Module 12 – Evading IDS Firewalls and Honeypots

The objective of this lab is to help students learn and detect intrusions in a network, log, and view all log files.

In this lab, you will learn how to:

- Install and configure Snort IDS
- Detect Intruders using HoneyBot
- Bypassing Windows Firewall Using Nmap
- Bypassing Firewall Rules Using HTTP/FTP Tunneling
- Bypassing Windows Firewall using Metasploit

Module 13 – Hacking Web Servers

The objective of this lab is to help students learn to detect unpatched security flaws, verbose error messages, and much more.

The objective of this lab is to:

- Perform Web Server Security Reconnaissance
- Detect unpatched security flaws like Shellshock bug
- Crack remote passwords

Module 14 – Hacking Web Applications

The objective of this lab is to provide expert knowledge of web application vulnerabilities and attacks, such as:

- Parameter tampering
- Cross-Site Scripting (XSS)
- Stored XSS
- Username and Password Enumeration
- Exploiting WordPress Plugin Vulnerabilities
- Exploiting Remote Command Execution Vulnerability
- Web Application Auditing Framework
- Website Vulnerability Scanning

Module 15 – SQL Injection

The objective of this lab is to provide expert knowledge on SQL Injection attacks and other responsibilities that include:

- Understanding when and how web application connects to a database server in order to access data
- Extracting basic SQL Injection flaws and vulnerabilities
- Testing web applications for Blind SQL Injection vulnerabilities
- Scanning web servers and analyzing the reports
- Securing information in web applications and web servers

Module 16 – Hacking Wireless Networks

The objective of this lab is to protect the wireless network from attackers.

In this lab, you will learn how to:

- Analyze Wireless Network Traffic using Wireshark
- Crack WEP using aircrack-ng
- Crack WPA using aircrack-ng

Module 17 – Hacking Mobile Platforms

The objective of this lab is to help students learn to detect unpatched security flaws in mobile devices, and use them for performing penetration testing.

The objective of this lab is to:

- Exploit the vulnerabilities in an Android device
- Crack websites passwords
- Use Android device to perform a DoS attack on a machine
- Perform Security Assessment on an Android Device

Module 19 – Cloud Computing

The objective of this lab is to help students to build a cloud server, secure it with OpenSSL Encryption, and exploit java vulnerability to harvest user credentials.

In this lab, you will:

- Create User Accounts and assign user rights
- Securing ownCloud from malicious file uploads using ClamAV
- Bypassing ownCloud Antivirus and hacking the host using Kali Linux

Module 20 – Cryptography

This lab will show you how to use encryption tools to encrypt data. It will teach you how to:

- Use encrypting/decrypting techniques
- Generate Hashes and checksum files

Tags : Footprinting and Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis , System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-Service, Session Hijacking, Evading IDS Firewalls and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, Cloud Computing, Cryptography

]]>- CertificateOfCompletion_Being Positive At Work
- CertificateOfCompletion_Building Resilience
- CertificateOfCompletion_Building Self Confidence 2
- CertificateOfCompletion_C Plus Plus Game Programming 2
- CertificateOfCompletion_Communicating With Confidence
- CertificateOfCompletion_Communication Foundations 2013
- CertificateOfCompletion_Communication Tips Weekly
- CertificateOfCompletion_Cultivating Mental Agility
- CertificateOfCompletion_Enhancing Resilience
- CertificateOfCompletion_Executive Leadership
- CertificateOfCompletion_Finding A Remote Job
- CertificateOfCompletion_Jodi Glickman On Pitching Yourself
- CertificateOfCompletion_Leadership Foundations
- CertificateOfCompletion_Management Foundations Advanced Applications
- CertificateOfCompletion_Managing Virtual Teams 4
- CertificateOfCompletion_Managing Your Manager
- CertificateOfCompletion_Preparing For Successful Communication
- CertificateOfCompletion_Scrum Advanced
- CertificateOfCompletion_Scrum The Basics
- CertificateOfCompletion_Sheryl Sandberg And Adam Grant On Option B Building Resilience
- CertificateOfCompletion_Succeeding In A New Job
- CertificateOfCompletion_The Neuroscience Of Learning
- CertificateOfCompletion_Using Questions To Foster Critical Thinking And Curiosity
- CertificateOfCompletion_Working Remotely 2015

Source : http://geffrotin.com/yann/cv/education_management.php?lang=FR

Source : https://www.linkedin.com/learning/

]]>Learn more about counting and probability.

Arrangements And Selections Topic Completed

Expected Value Topic Completed

Probability Of Simple Events Topic Completed

Probability Of Compound Events Topic Completed

Independent Events Topic Completed

Probability Using Tree Diagrams Topic Completed

Probability Trees With And Without Replacement Topic Completed

Reverse Probability – Bayes’ Theorem Topic Completed

Bayes’ Theorem And Medical Testing Topic Completed

Probability Patterns Of Discrete Variables Topic Completed

Comparing Distributions Topic Completed

The Binomial Distribution Topic Completed

A Problem Using Binomial Distribution Topic Completed

Bernoulli Trials And The Binomial Formula Topic Completed

The Normal Distribution Topic Completed

Using Excel To Calculate Binomial Probabilities Topic Completed

Using Excel To Find The Mean Of A Binomial Distribution Topic Completed

MODULE 2 Statistics Complete

Learn more about statistics.

Cumulative Frequency And The Ogive Topic Completed

Cumulative Frequency, Quartiles And The Inter-Quartile Range Topic Completed

Mean Of Grouped Frequency Tables Topic Completed

Constructing A Stem And Leaf Diagram Topic Completed

Comparative Stem And Leaf Diagram Topic Completed

Histograms – Understanding That Area Gives Frequency Topic Completed

Introduction To Sampling Techniques Topic Completed

Random Stratified Sampling Topic Completed

Statistical Correlation Topic Completed

Measuring Correlation – Pearson’s Correlation Coefficient Topic Completed

Using Excel To Calculate Pearson’s Correlation Coefficient Topic Completed

Using Excel To Find Pearson’s Correlation Coefficient, Using The Inbuilt Function Topic Completed

Regression Lines And Their Equation Topic Completed

The Meaning Of The Coefficients In The Equation Of The Regression Line Topic Completed

Using Excel To Calculate The Equation Of The Regression Line Topic Completed

Using Excel To Find The Equation Of The Regression Line, Using Inbuilt Function Topic Completed

MODULE 3 Synthetic Geometry Complete

Learn more about synthetic geometry.

Properties Of Shapes Topic Completed

Geometric Reasoning – Part 1 Topic Completed

Geometric Reasoning – Part 2 Topic Completed

Geometric Reasoning – Part 3 Topic Completed

Geometric Reasoning – Part 4 Topic Completed

Proof Of Theorem 11 Topic Completed

Proof Of Theorem 12 Topic Completed

Proof Of Theorem 13 Topic Completed

MODULE 4 Coordinate Geometry Complete

Learn more about coordinate geometry.

Geometry With Coordinates Topic Completed

Equation Of A Straight Line Topic Completed

Parallel Lines Topic Completed

Perpendicular Lines Topic Completed

The Graphs Of Y=Kx^N Topic Completed

Translation Of Functions Topic Completed

Reflection Of Functions Topic Completed

Stretching Functions Topic Completed

General Transformation Of Functions Topic Completed

Equation Of A Circle 1 – Centre (0,0) Topic Completed

Equation Of A Circle 2 – Centre Not (0,0) Topic Completed

Equation Of A Circle 3 Topic Completed

Diameter Of A Circle Topic Completed

Tangent And Normal To A Circle Topic Completed

Touching Circles Topic Completed

Prove That A Line Is A Tangent To A Circle Topic Completed

Distance From A Point To A Line Topic Completed

Angle Between Two Lines Topic Completed

Dividing A Line Segment In A Given Ratio Topic Completed

MODULE 5 Trigonometry Complete

Learn more about trigonometry.

Finding Angles With Sine Ratio Topic Completed

Finding Sides With The Sine Ratio Topic Completed

Finding Angles With The Cosine Ratio Topic Completed

Finding Sides With The Cosine Ratio Topic Completed

Finding Angles With The Tangent Ratio Topic Completed

Finding Sides With The Tangent Ratio Topic Completed

Finding A Missing Side With The Sine Rule Topic Completed

Finding A Missing Angle With The Sine Rule Topic Completed

Problem Solving With The Cosine Rule Topic Completed

Introducing Radians Topic Completed

Using Radians To Find Area Of Sector Topic Completed

Sketching And Matching Trigonometric Functions Topic Completed

Graphing Trigonometric Functions. Y = Sinx – Calculator Work – In Degrees Topic Completed

Graphing Trigonometric Functions. Y = 3sin2x – Calculator Work – In Radians Topic Completed

Introducing The Unit Circle Topic Completed

The Unit Circle – Drawing Sine And Cosine Topic Completed

Comparing Degrees To Radians On The Unit Circle Topic Completed

Solving Trigonometric Equations Topic Completed

Proving The Sine Rule Topic Completed

Proving The Cosine Rule Topic Completed

Proving Trigonometric Identity – (Sin Squared + Cos Squared = 1) Topic Completed

Finding Areas With Trigonometry Topic Completed

3-D Trigonometry – The Cuboid Topic Completed

3-D Trigonometry – Rectangular Based Pyramid Topic Completed

Area Of A Segment Topic Completed

MODULE 6 Number Systems Complete

Learn more about number systems.

Large Numbers In Standard Form Topic Completed

Changing Decimals To Standard Fom Topic Completed

Changing Large Numbers From Standard Form Topic Completed

Changing Small Numbers From Standard Form Topic Completed

Adding And Multiplying Simple Powers Topic Completed

Working With Indices Topic Completed

Negative Indices Topic Completed

Fractional Indices, Numerator Of 1 Topic Completed

Index Power Equal To 0 Topic Completed

Positive Fractional Indices All Types Topic Completed

Negative Fractional Indices Topic Completed

Writing Index Numbers As A Power Of 2 Topic Completed

Quadratic Number Patterns Topic Completed

Manipulating Complex Numbers And The Complex Conjugate Topic Completed

The Argand Diagram And Modulus Topic Completed

The Meaning Of I Topic Completed

Patterns With Imaginary Numbers Topic Completed

Rational Or Irrational Topic Completed

Root 2 Is Irrational – Proof By Contradiction Topic Completed

Finding The Cube Roots Of 8 Topic Completed

Changing The Base Of Logarithms Topic Completed

Logarithmic Equations Topic Completed

Limits Of Sequences Topic Completed

Arithmetic Series Topic Completed

Geometric Series Topic Completed

Infinite Geometric Series – Part 1 Topic Completed

Infinite Geometric Series – Part 2 Topic Completed

Deriving Amortisation Formula From Geometric Series Topic Completed

The Sum Of The First N Natural Numbers – Proof By Induction Topic Completed

Proof By Induction Applied To A Geometric Series Topic Completed

Further Proof By Induction – Multiples Of 3 Topic Completed

Further Proof By Induction – Factorials And Powers Topic Completed

MODULE 7 Arithmetic – Financial Maths Complete

Learn more about arithmetic using financial maths.

Profit, Markup And Margin Topic Completed

Calculating Profit With Special Offers Topic Completed

Percentage Loss – Part 1 Topic Completed

Percentage Loss – Part 2 Topic Completed

Simple Interest – Calculating The Interest Topic Completed

Simple Interest – Calculating The Rate Topic Completed

Simple Interest – Calculating The Principal Topic Completed

Simple Interest – Calculating The Period Topic Completed

Percentage Changes Using Multipliers Topic Completed

Reverse Percentages And VAT Topic Completed

Introducing Compound Interest Topic Completed

Compound Interest And Annual Equivalent Rate Topic Completed

Compound Interest APR With Credit Cards Topic Completed

Depreciation Topic Completed

Calculating APR Topic Completed

Calculating Monthly Interest From APR – 2 Methods Topic Completed

Income Tax, USC And PRSI Topic Completed

Net Pay/Take Home Pay Topic Completed

Present Value – Working Out Future Value Topic Completed

Present Value – Working Out Present Value Topic Completed

Present Value – Harder Example Topic Completed

Present Value And Amortisation Problem Topic Completed

Completing An Amortization Schedule Topic Completed

Savings And Amortization Topic Completed

MODULE 8 Length, Area And Volume Complete

Learn more about length, area and volume.

Circumference Of A Circle Topic Completed

Area Of A Circle Topic Completed

Finding Radius And Diameter Of A Circle From Its Perimeter Topic Completed

Finding Radius And Diameter From Area Of Circle Topic Completed

Area Of Trapezium Topic Completed

Area Of Acute Angled Triangles Topic Completed

Area Of Obtuse Angled Triangles Topic Completed

Area Of Parallelogram Topic Completed

Area Of Rectangles Topic Completed

Area Compound Shapes (Rectangles) Topic Completed

Area Of Compound Shapes Topic Completed

Area Of Compound Shapes (Triangles) Topic Completed

Volume And Surface Area Topic Completed

Sectors And Arcs Topic Completed

Area Of A Segment Topic Completed

Volume Of Compound Solid

MODULE 9 Complex Numbers Complete

Learn more about complex numbers.

Manipulating Complex Numbers And The Complex Conjugate Topic Completed

The Argand Diagram And Modulus Topic Completed

The Meaning Of I Topic Completed

Patterns With Imaginary Numbers Topic Completed

Writing Complex Numbers In Polar Form Topic Completed

Multiplying And Dividing In Polar Form (Proof) Topic Completed

Multiplying And Dividing In Polar Form (Example) Topic Completed

Proof Of De Moivre’s Theorem Topic Completed

Complex Numbers When Solving Quadratic Equations Topic Completed

Cubic Equations With Complex Roots Topic Completed

Finding The Cube Roots Of 8 Topic Completed

MODULE 10 Expressions And Formulae Complete

Learn more about expressions and formulae.

Factorising Quadratics Topic Completed

Factorising – Difference Of Two Squares Topic Completed

Expanding Brackets (Grid Method) Topic Completed

Expanding Brackets (FOIL Method) Topic Completed

Expanding Any Two Brackets Topic Completed

Rearranging Simple Formulae Topic Completed

Rearranging Simple Formulae – 2 Steps Topic Completed

Rearranging Formulae With Squares And Square Roots Topic Completed

Rearranging Formulae New Subject Appearing Twice Topic Completed

Simplifying Surds Topic Completed

Further Calculations With Surds Topic Completed

Completing The Square Topic Completed

General Completing The Square Topic Completed

Binomial Expansion Topic Completed

MODULE 11 Solving Equations Complete

Learn more about solving equations.

Equations With Linear Functions In The Denominator Topic Completed

Quadratic Equations Using The Formula Topic Completed

Quadratic Equations Non Unitary X Squared Topic Completed

Quadratic Equations Both Brackets The Same Sign Topic Completed

Quadratic Equations Brackets With Different Signs Topic Completed

Quadratic Equations That Have To Be Rearranged Topic Completed

Solving Simultaneous Equations Graphically Topic Completed

Simultaneous Equations Both Negative Signs Topic Completed

Simultaneous Equations Negative And Positive Signs Topic Completed

Simultaneous Equations Both Positive Topic Completed

Hidden Quadratics Topic Completed

Use Of The Discriminant Topic Completed

Equations With Indices Topic Completed

Logarithmic Equations Topic Completed

Solving Exponential Equations Topic Completed

From Roots To Functions Topic Completed

Non-Linear Simultaneous Equations Topic Completed

Factor Theorem – Part 1 Topic Completed

Factor Theorem – Part 2 Topic Completed

The Remainder Theorem Topic Completed

General Remainder And Factor Theorem Topic Completed

Finding Roots Of Cubic Equation Topic Completed

Modulus Equations Topic Completed

Using Graphs To Solve Modulus Equations Topic Completed

MODULE 12 Inequalities Complete

Learn more about inequalities.

Finding Inequalities From Shaded Regions Topic Completed

Solving Linear Inequalities With Fractions Topic Completed

Solving Quadratic Inequalities – Method 1 Topic Completed

Solving Quadratic Inequalities – Method 2 Topic Completed

Solving Quadratic Inequalities – Method 3 Topic Completed

Non-Unitary X^2 – Trial And Error Method Topic Completed

Non-Unitary X^2 – Algebra Method Topic Completed

Non-Unitary X^2 – Graphical Method Topic Completed

Special Cases (Use SQI DoTS) Topic Completed

Rational Functions Topic Completed

Modulus Equations Topic Completed

Using Graphs To Solve Modulus Equations Topic Completed

Modulus Inequalities Topic Completed

Modulus Function On A Graph Topic Completed

Graphical Solution Of Modulus Inequalities Topic Completed

MODULE 13 Functions Complete

Learn more about functions.

Plotting Quadratic Graphs From Table Of Values Topic Completed

Plotting Cubic Graphs From Table Of Values Topic Completed

Plotting Reciprocal Graphs From Table Of Values Topic Completed

Plotting Exponential Graphs From Table Of Values Topic Completed

Matching Equations And Sketches Topic Completed

Sketching Parabola Using Completing The Square Topic Completed

Completing The Square And Sketching The Full Method Topic Completed

Matching Functions And Graphs – Quadratic / Exponential Topic Completed

Translation Of Functions Using F(X-A) Topic Completed

Translating Of Functions Using F(X)+A Topic Completed

Sketching Functions In X Direction Topic Completed

Sketching Functions In The Y Direction Topic Completed

The Discriminant Topic Completed

Inverse And Bijective Functions Topic Completed

MODULE 14 Calculus – Differentiation Complete

Learn more about differentiation.

Basic Differentiation Of Y = X^N Topic Completed

Differentiation Of Polynomials Topic Completed

Equation Of A Tangent Topic Completed

Equation Of A Normal Topic Completed

Harder Questions On Normals Topic Completed

General Differentiation Of X^N Topic Completed

Second Derivative Topic Completed

Differentiation Of Tangents Topic Completed

Using Different Variables Topic Completed

Differentiating Products And Quotients Topic Completed

The Chain Rule Topic Completed

The Product Rule Topic Completed

The Quotient Rule Topic Completed

Differentiation Of Logarithms Topic Completed

Differentiation Of Y = Sinx Topic Completed

Differentiation Of Y = Cosx Topic Completed

Differentiation And Rates Of Change Topic Completed

Rate Of Change – Example 1 Topic Completed

Rate Of Change – Example 2 Topic Completed

Differentiation And Turning Points Topic Completed

Differentiation And Matching Graphs Topic Completed

Applications Of Differentiation 1 (Displacement / Velocity / Acceleration) Topic Completed

Applications Of Differentiation 2 (Voltage / Current) Topic Completed

Maximum Volume Of Box Topic Completed

Exploring Relationships Between Graphs Of Cubic Functions And Their Differentials Topic Completed

Exploring Relationships Between Graphs Of Trigonometric Functions And Their Differentials Topic Completed

Exploring Relationships Between Graphs Of Exponential Functions And Their Differentials Topic Completed

Inverse Functions Differentiated Topic Completed

MODULE 15 Calculus – Integration Complete

Learn more about integration.

Basic Integration Topic Completed

The Integral Sign Topic Completed

Harder Integration Topic Completed

Definite Integration Topic Completed

Area Between Lines Topic Completed

Basic Differential Equations Topic Completed

Integration Of Trig Functions (Y=Cos4x) Topic Completed

Integration Of Exponentials Topic Completed

Introducing The Trapezoidal Rule Topic Completed

Trapezoidal Rule Into Integration Topic Completed

Finding The Area Between A Quadratic Function And A Straight Line Topic Completed

I would like to thank Peachpit Press for helping create this book.

I highly recommend this book! This book will improve your mind and maybe, your life. This book can help you with solutions you might encounter in your work life. It will complete and improve your skills. I see this book as an opportunity to grow (if you grow, you’re customers will grow too; it’s a win-win situation) and master the subject at hand. After you learn something, you can teach others people. So, I think you can evolve professionally with this book.

I have published my review on Amazon, GoodRead and in my personal Blog.

The authors have serious technical writing skills. I’ve been inspired by such talented, experimented and professional people.

Intended Audience : technical coordinators, entry level system administrators, students (anyone who already have a little knowledge of macOS and want to go further.)

I feel supported by Apple. The book is very well organised. Written in 2016. It is about an application from a very used operating system by Apple Inc. This is an IT manual. It is about being knowledgeable about an Apple product. It is a scientific and highly technical subject. It explains how OS X Server works. It is well-written. It’s easy to read. It is exactly 722 pages long. The authors make a complex subject easy to read and practice. It’s a colourful book (with highlights and screenshots). Thats good to my eyes and efficient because as the idiom say « A picture is worth a thousand words ».This book is very well organised. All the exercises are planned to be done in a safe environment (test server).

If you want to know more on a subject there is a lot of links to the Apple official support website (often it can be a pdf file with beautiful pictures).

I would like to thank all the people who have worked at Peachpit Press for making this book possible. Thanks for sharing with us !

I have published my review on Amazon, GoodRead and in my personal Blog.

**My personal opinion : **

I think of the reward before reading a book. After reading a book, i have a feeling of mastery. It’s good because it expand my knowledge. I feel supported. I’m passionate about Apple products. I highly recommend this book! This book will improve your mind and maybe, your life. This book is full of solutions you might encounter in your work life. It will complete and improve your skills. I see this book as an opportunity to grow (if you grow, you’re customers will grow too; it’s a win-win situation) and master the subject at hand. After you learn something, you can teach others people. So, I think you can evolve professionally with this book.

**Why buy this book : **

See it as an accelerator for your career.

**How to choose : **

You have the power to buy at Amazon in kindle or paperback format. If it an ebook : it’s cheaper because no need to pay and wait for the delivery ; and more useful because it can be open in a tab on your computer. To me, I prefer the Kindle Cloud Reader to practice while I am reading.

**Where to buy :**

**About the author : By Are Dreyer and Ben Greisler**

Ben Greisler has published 8 books with Peachpit on Apple related technologies. I think he had a great motivation to go this far.

http://www.peachpit.com/authors/bio/FDEBC5CE-CB9B-4001-8CF3-2DFC7E2E59E5

https://www.linkedin.com/in/bengreisler

**About Apple inc :**

Apple is known for delivering quality product and once again they do their best to satisfy their customers.

**About me :**

I’m an Apple enthusiast.

]]>- rosetta stone english (british) unit 20 lesson 1 core lesson
- rosetta stone english (british) unit 20 lesson 1 grammar
- rosetta stone english (british) unit 20 lesson 1 pronunciation
- rosetta stone english (british) unit 20 lesson 1 vocabulary
- rosetta stone english (british) unit 20 lesson 2 core lesson
- rosetta stone english (british) unit 20 lesson 2 pronunciation

Vous pouvez apprendre à mettre à jour, mettre à niveau vers une nouvelle version de macOS ou réinstaller. Configurez macOS selon vos propres besoins. Peut-être, si vous êtes programmeur, utilisez l’interface de ligne de commande (CLI). Vous pouvez apprendre à gérer les comptes d’utilisateurs et leur mot de passe. En savoir plus sur le système de fichiers, FileVault (pour chiffrer le disque de démarrage sur votre Mac) et les autorisations. Apprenez à gérer Time Machine pour votre sauvegarde. Apprenez à installer des applications et à configurer votre réseau. Le livre compte près de 1000 pages et ça vaut le coup!

Il peut être acheté chez amazon au format Kindle (moins cher et plus utile) ou au format poche. Je préfère utiliser le Kindle Cloud Reader pendant que je lis.
]]>