Free Online

Accounting

Show filters

Level

Duration

Language

Become an Accounts Payable Officer

Become an Accounts Payable Officer

0

Kick-start your career in accounting and help companies run more effectively as an accounts payable officer. With this learning path, you'll gain a solid foundation in accounting, finance, and cash flow, as well as experience using essential accounting tools like QuickBooks.Review essential math concepts and strategies.Learn the fundamentals of accounting and corporate finance.Practice with hands on essential training in Quickbooks.

LinkedIn Learning
22 hours worth of material
selfpaced
view all
Kubernetes Essential Training: Application Development

Kubernetes Essential Training: Application Development

0

Take your Kubernetes knowledge from theory to practice. Learn how to use Kubernetes to develop and run real-world applications.Take your Kubernetes knowledge from theory to practice. Learn how to use Kubernetes to develop and run real-world applications. Instructor Matt Turner starts by showing you how to run local clusters, containers, and pods; execute commands; and view activity from the command line as well as the Kubernetes dashboard. Next, discover how to orchestrate practical workloads, including batch workloads with jobs and cron jobs. Matt then shows how to make Kubernetes smarter and safer using the built-in resource management, scheduling, and security tools. He also explores some advanced deployment patterns using namespaces, sidecars, and extensions like operators. Plus, discover tools and techniques to take your Kubernetes development further, such as manifest file generation with Helm, advanced debugging with kubectl commands, and faster and more frictionless deployments with Telepresence.Note: This course was also designed to help prepare you for the Certified Kubernetes Application Developer (CKAD) examination from the Linux Foundation. Learn more about the certification and exam details at https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/".

LinkedIn Learning
3-4 hours worth of material
selfpaced
view all
Publish an eBook

Publish an eBook

0

Ready to break into the publishing industry? Whether you are interested in the book or periodical industry, as a self-published author or a traditional publisher, you can get the skills you need to oversee the production and distribution process.Learn what an EPUB file is and how it operates.Create multimedia, standard, and fixed layout files.Know the key players and distribution options for book publishing.

LinkedIn Learning
26 hours worth of material
selfpaced
view all
Financial Accounting - IITB

Financial Accounting - IITB

0

This course discusses basic concepts of financial accounting and reporting. The viewpoint is that of readers of financial reports rather than the accountants who prepare them. COURSE OBJECTIVES This course is designed with the following objectives: (i) Help the participants to become intelligent users of accounting information (a) Understand the basic accounting and financial terminology. (b) Understand how events affect firm value (c) Understand how financial transactions are recorded. (d) Make the participants’ comfortable looking through financial statements (ii) Develop the ability in participants’ to use financial statements to assess a company’s performance INTENDED AUDIENCE: Students, employees, entrepreneurs (The course will apply to participants various disciplines like Engineering, Sciences, Management, Commerce, Arts, Humanities, Heath, Medicine).PREREQUISITES:Nil.

Swayam
8 weeks long
past
view all
Subject - Geology; Paper - Metamorphic Petrology & Thermodynamics

Subject - Geology; Paper - Metamorphic Petrology & Thermodynamics

5

This course is a basic to advance introduction for the post graduate students in petrology. Geology is plagued by the problem of in accessibility; they see only the tiny fraction of the rocks that composes the Earth. During the processes of uplift and the erosion on the surface, but their exact place of origin is vague. As a result, a large proportion of our information about earth is indirectly coming from analysis of subsurface materials, geophysical studies, or experiments conducted at variable temperature and pressure. Metamorphic rocks are the most common rock type on Earth, and their study allows us to put constraints on the pressure, stress and temperature conditions in the crust and mantle, and on the bulk composition in these environments. Metamorphism affects rocks in three ways; it changes their mineralogy, it changes their shape, and it can change their composition.In this course we will look at the processes behind metamorphism, the description, and classification of metamorphic rocks, and how to extract information from metamorphic rocks and minerals to determine the conditions under which they formed. Metamorphism means change in form. In geology the term is used to refer to a solid-state recrystallization of earlier igneous, sedimentary, or metamorphic rocks. Such study includes description and classification of rocks as well as interpretation of their origin. Petrology is subdivided into three major rock types: Igneous, sedimentary, and metamorphic. Igneous and metamorphic petrology are combined, due to the similarity of approach and principle involved during their formation. As per the syllabus of UGC based on CBCS, I henceforth use the term metamorphic petrology and thermodynamics is to study metamorphic rocks and their processes of formation within one single paper as basic to advance for the post graduate students.This course deals with the naturally occurring rocks in field as well as laboratory analysis data that provide sufficient information how they occur in the nature. It gives idea of modern petrological theories which are widely accepted for their origin. The course emphasis the petrology which cover the Geology & its Perspective, Career in geology, Structure and classification of the silicate minerals along with Definition of metamorphism, Factors controlling metamorphism, variables / agents and types / kinds of metamorphism – contact, regional, fault zone metamorphism, impact metamorphism. Types and classification based on metamorphic agent. Regional metamorphism and paired metamorphic belts with reference to the theory of plate tectonics. Mineralogical phase rule for closed and open systems, nature of metamorphic reactions, concept and classification of metamorphic facies and facies series, Introduction to ultrahigh temperature and ultrahigh pressure metamorphism. Metamorphic zones, isograde and reaction isograde, Concept of classification of metamorphic facies, facies-series and grade, structure and textures of metamorphic rocks; chemographic projection, graphical representation of metamorphic minerals assemblages; ACF, AKF, AFM and others diagram.Description of each facies of low, medium to high pressure and very high pressure with special reference to characteristic minerals, subdivision into zones / subfacies, mineral assemblages; Metamorphic reactions and pressure – temperature conditions of metamorphism. Regional metamorphism of pelitic, calcareous, basic, and ultra basic rocks and thermal metamorphism of calcareous and pelitic rocks. Schreinemakers rule and construction of petrogenetic grids, metamorphic differentiation, anatexis and origin of migmatites in the light of experimental studies. Laws of thermodynamics; Gibb’s free energy, entropy, ∆G of metamorphic reactions (solid-solid and dehydration reactions); Geothermobarometry and PT paths. Petrographic details of some important metamorphic rocks such as - slate, phyllite, schists, gneiss, quartzite, marble, charnockite, leptynite, khnodalite etc.The course definitely provides better understanding to students for the processes and principles involved during the origin and evolution of the metamorphic rocks. The course contains video, text, assignment; quiz, case studies, references etc and I hope it will be useful for the geology students within and outside India. Last but not least, I highly accept any comments, questions, or suggestion for the improvement of this course.

Swayam
16 weeks long
past
view all
CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools

CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools

0

Learn how to use some of the most essential penetration testing tools—from Nmap to Kali Linux—as you prepare for the Penetration Testing Tools domain of the CompTIA PenTest+ exam.Jump-start your career in cybersecurity by earning the CompTIA PenTest+ certification. In this course, learn how to leverage some of the most essential penetration testing tools—from Kali Linux to the Nmap network discovery and security auditing tool—as you prepare for the Penetration Testing Tools domain of the CompTIA PenTest+ exam. Instructor Michael Solomon helps to acquaint you with the different tools you'll need in your penetration testing toolbox, including tools for reconnaissance, enumeration, vulnerability testing, persistence, and evasion. Learn how to work with code cracking tools like OllyDbg, open-source research tools, remote access tools, and more.This Total Seminars course covers the exam certification topics. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit totalsem.com/linkedin. LinkedIn Learning members receive special pricing.This course was created by Total Seminars. We are pleased to offer this training in our library.We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
Ethical Hacking: Introduction to Ethical Hacking

Ethical Hacking: Introduction to Ethical Hacking

0

What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.IntroductionLocking down the organizationWhat you should knowHacking ethically1. Ethical Hacking OverviewInformation security overviewToday's threat landscapeNavigating attack vectorsComparing attack typesUnderstanding the Cyber Kill ChainChallenge: The Cyber Kill ChainSolution: The Cyber Kill Chain2. Information Security ControlsDefining ethical hackingDefense in depthManaging incidents3. Data Protection in a Digital WorldExploring security policiesCreating security policiesComponents of a security policyProtecting the dataStandards and regulationsThe COBIT frameworkExploring the security planCreating security policiesRecognizing components of a security policyChallenge: Create a security policySolution: Create a security policy4. Supporting Ethical HackingUnderstanding vulnerabilitiesPenetration testing methodologyHacking conceptsThe human factor in ethical hackingStepping through the hacking phasesConclusionNext steps

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
GEOLOGY - GEOCHEMISTRY

GEOLOGY - GEOCHEMISTRY

0

I am going to offer you Online course entitleGeochemistry.This 2 credits course run online for 8 weeks and finally end with examination. This course is design for B.Sc. Geology students. This course is a basic introduction for the undergraduate students pursuing B.Sc. Geology degree Knowledge in the field of geochemistry is expanding rapidly. Students must understand the important chemical approaches used to study the Earth. The study of geology and earth sciences has become more environmentally orientated in recent years and, as a general trend, has also become more quantitative. In turn mathematics and chemistry are an increasingly important part of environmental sciences curriculum. Recognizing both of these trends essentials of Geochemistry bring an environmental and quantitative focus to the study of GeochemistryInvalid HTML tag: tag name o:p is not allowed In my view there are two basic ways to introduce geochemistry to students. The formation of elements approaches descriptively goes through the formation of earth and the elements in it. The present course is designed with a view to introduce a general concept and principles of Geochemistry; as per the syllabus of UGC the course emphasis thegeochemistry, which cover theIntroduction to geochemistry, basic knowledge about crystal chemistry, types of chemical bonds, coordination numbers, colloids in geological system, ion exchange and geological evidence for earlier colloids, elementary idea of periodic table along with cosmic abundance of elements, composition of planets and meteorite and along with geochemical cycle, the distribution of major, minor and trace elements in igneous, metamorphic and sedimentary rocks and elements of geochemical thermodynamics, isomorphism and isotope geochemistryInvalid HTML tag: tag name o:p is not allowed Thecoursedefinitelyprovides better understanding to students for the processes and principles involvedduring the originand evolutionof the rocks.The course contains video, text, assignments, quiz, case studies, references etc andI hope it will be useful for the geology students within and outside IndiaInvalid HTML tag: tag name o:p is not allowed Last but not least, I highly acceptany comments, questions, or suggestion for the improvement of this courseInvalid HTML tag: tag name o:p is not allowed

Swayam
8 weeks long
past
view all
DevOps Foundations: Site Reliability Engineering

DevOps Foundations: Site Reliability Engineering

0

Explore the basics of site reliability engineering for DevOps. Learn SRE techniques for release, change and incident management, self-service automation, and more.Site reliability engineering (SRE) is an emerging paradigm in DevOps. The biggest names in tech—companies like Google, Netflix, Microsoft, and LinkedIn—all use SRE. In fact, industry wide, "site reliability engineer" is replacing "DevOps engineer" in job posts. Simply put, SRE is software engineering applied to operations—for the cloud native era. This course introduces the basics of site reliability engineering, including how SRE fits into DevOps and how it can be integrated into your unique business environment. Instructors Ernest Mueller and James Wickett cover the major areas of expertise, including release engineering, change management, incident management and retrospectives, self-service automation, troubleshooting, performance, and deliberate adversity. Learn how to define reliability through SLAs and SLOs, handle crisis, design distributed systems, and scale your systems and your team. Plus, explore time and project management strategies that bring humanity back to the SRE's job.

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
Ethical Hacking: Denial of Service

Ethical Hacking: Denial of Service

0

Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Ethical Hacker exam. In this course, learn about the history of the major DoS attacks and the types of techniques hackers use to cripple wired and wireless networks, applications, and services on the infrastructure. Instructor Malcolm Shore covers the basic methods hackers use to flood networks and damage services, the rising threat of ransomware like Cryptolocker, mitigation techniques for detecting and defeating DoS attacks, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
Financial Accounting Part 2

Financial Accounting Part 2

0

Take a deeper dive into the world of financial accounting. Learn about financial ratio analysis, forecasting financial statements, cash flow analysis, and more.While their products and services may differ wildly, successful companies have at least one thing in common: they're savvy with a financial report. Financial statements and reports allow accounting and finance professionals to peer into the inner workings of their organization, pinpointing key areas of risk before they evolve into issues that steer the company off course. In this course—the second installment in the Financial Accounting series—accounting professors Jim and Kay Stice take a deeper dive into the world of financial accounting. Jim and Kay discuss financial ratio analysis, cash flow analysis, forecasting financial statements, business valuation, and more. To wrap up the course, they use the different models covered in the course to estimate the value of McDonalds.IntroductionFinancial analysis, cash flow analysis, and valuation1. Quick Review of Financial StatementsWho uses financial statements?Review of the balance sheetReview of the income statementReview of the statement of cash flows2. Analyzing Financial StatementsWhat is financial ratio analysis?Comparing financial statements across timeComparing financial statements across companiesCommon-size financial statements3. Ratio Analysis: DuPont FrameworkGunpowder, the French Revolution, and the DuPont frameworkRatio analysisReturn on equityDuPont frameworkCurrent ratioDebt ratioPrice-earnings ratioReal world: Apple vs. Google vs. Microsoft4. Ratio Analysis: The Operating CycleNike, McDonald’s, and the operating cycleThe operating cycleDays sales in inventoryAverage collection periodDays purchases in payableReal world: Procter & Gamble5. The Statement of Cash FlowsJim Stice operating cash flow matrix and a wife named KayAnalyzing cash flowsWhat does it tells us?Cash flow patternsOne method of analysisTwo methods for presentation6. Forecasting Financial StatementsForecasting the financial statements of Home DepotWhat causes financial statement amounts to change?The initial assumptionsForecasted income statementForecasted retained earningsForecasted assetsForecasted liabilities and equity7. Intro to Business ValuationThe intersection of accounting and financeValue is based on expectations about the futureOverview of the market approach: Using multiplesOverview of the cost approach: Depreciated replacement costOverview of the income approach: Discounted cash flow8. Valuation: Using MultiplesThe Microsoft IPOSimple illustration: Valuation of 69 Blaine AvenueEarnings multiplesEquity multiplesSales multiplesOther multiples: The case of WhatsApp9. Valuation:Free Cash FlowsBuying the Hong Kong car?Basic idea: Cash flows, timing, and riskRisk and interest ratesForecasting cash flowsSimple discounted cash flow valuation example10. Valuation: Comparing ModelsBrief McDonald's historyMcDonald's: The numbersMcDonald's: Dividend-based valuationMcDonald's: Earnings multipleMcDonald's: Discounted cash flow valuationMcDonald's: Lessons from a comparison of the modelsConclusionNext steps

LinkedIn Learning
3-4 hours worth of material
selfpaced
view all
Ethical Hacking: Wireless Networks

Ethical Hacking: Wireless Networks

0

IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
Decision making using financial accounting

Decision making using financial accounting

0

This course aims at developing skills to understand, evaluate and use financial information in business decision making. The course will introduce participants to the vocabulary of financial. It will develop in the participants an understanding of the important tools and techniques used in analyzing financial information.INTENDED AUDIENCE: Generic at the PG levelPREREQUISITES: GraduateINDUSTRY SUPPORT: Basic Introductory course

Swayam
8 weeks long
past
view all
Become an Ethical Hacker

Become an Ethical Hacker

0

Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.Learn about common and emerging threats to systems.Practice using tools to test networks and identify risks.Implement countermeasures to prevent cybersecurity attacks.

LinkedIn Learning
30 hours worth of material
selfpaced
view all
Learning Azure Kubernetes Service (AKS)

Learning Azure Kubernetes Service (AKS)

0

Learn how to use Kubernetes, the popular open-source container orchestration engine, with Microsoft Azure by leveraging Azure Kubernetes Service (AKS).Kubernetes is quickly becoming the standard for containerized infrastructure. In this course, learn how to use this popular open-source container orchestration engine with Microsoft Azure by leveraging Azure Kubernetes Service (AKS). Instructor Robert Starmer reviews the top options for getting AKS deployed, focusing on deploying the Managed Master model provided by AKS via the 'az' command line client, including integration with the Azure Container registry for more efficient application deployments. He then discusses how to scale AKS workers, create storage classes, and manage AKS deployments, including how to enable aggregate statistics using Azure Monitor.

LinkedIn Learning
1-2 hours worth of material
selfpaced
view all
Load more

Level

Duration

Language