Get involved in a learning adventure, mastering R from foundational basics to advanced techniques. This course is a gateway to the realm of data science. Explore statistical machine learning models and intricacies of deep learning and create interactive Shiny apps. Unleash the power of R and elevate your proficiency in data-driven decision-making.
This course will help you learn about the basic and advanced topics for automating tests with Selenium and Python. Without any prior knowledge of Python or automation testing, you will be able to perform automation testing with this practical course.
Formation officielle BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) pour les sites en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.
Course Overview: The "FinTech and Big Data Analytics" course provides an in-depth exploration of the dynamic intersection between financial technology (FinTech) and big data. Learners will gain essential knowledge about the innovative solutions disrupting the financial services industry, such as cryptocurrencies, insurtech, and regtech. The course offers insights into the tools, technologies, and trends shaping the future of finance, with a specific focus on how big data analytics is transforming business models and decision-making. By the end of the course, learners will have a comprehensive understanding of FinTech's growth and its applications, enabling them to make informed decisions in this rapidly evolving field. Course Description: This course delves deeper into the core concepts of financial technology and big data, exploring the impact of FinTech innovations on traditional financial systems. Topics covered include the rise of cryptocurrencies, regulatory technology (RegTech), the development of insurance technologies (InsurTech), and the use of big data in reshaping business strategies. Learners will explore the key technologies that drive FinTech, such as blockchain, artificial intelligence (AI), and machine learning, and learn how they enable data-driven decision-making in finance. The course prepares learners for the evolving future of FinTech, equipping them with the necessary skills to understand and navigate this transformative landscape. Course Modules: Module 01: Introduction to Financial Technology – FinTech Module 02: Exploring Cryptocurrencies Module 03: RegTech Module 04: Rise of InsurTechs Module 05: Big Data Basics: Understanding Big Data Module 06: The Future of FinTech (See full curriculum) Who is this course for? Individuals seeking to understand the financial technology landscape. Professionals aiming to advance their careers in the rapidly evolving FinTech sector. Beginners with an interest in emerging financial technologies and data analytics. Entrepreneurs looking to innovate within the financial services industry. Career Path: Financial Analyst FinTech Specialist Data Analyst in Financial Services Blockchain Developer RegTech Consultant InsurTech Specialist Big Data Analyst in Finance
LTE Airside training course description This course provides a concise insight into the LTE airside. Key parts of the course are detailed looks at the air interface protocol stack, cell acquisition, transmission and reception of data and of he layer 1 procedures along with layer 2 procedures. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE Airside training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE Airside training course contents Introduction and review of LTE This section describes the requirements of LTE and key technical features, and reviews the system architecture. LTE Architecture, UE, E-UTRAN and EPC. Specifications. OFDMA, SC-FDMA and MIMO antennas This section describes the techniques used in the LTE air interface, notably orthogonal frequency division multiple access (OFDMA) and multiple input multiple output (MIMO) antennas. Communication techniques for fading multipath channels. OFDMA, FFT processing and cyclic prefix insertion. SC-FDMA in the LTE uplink. Multiple antenna techniques including transmit & receive diversity and spatial multiplexing. Introduction to the air interface This section covers the operation of the air interface, the channels that it uses, and the mapping to the time and frequency domains of OFDMA and SC-FDMA. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and physical signals. LTE spectrum allocation. Cell acquisition This is the first of three sections covering the air interface physical layer. Here, we cover mobile procedures to start low-level communications with the cell, and base station transmission of the corresponding information. Primary/secondary synchronisation signals. Downlink reference signals. The master information block. Physical control format indicator channel. Organisation and transmission of the system information. Data transmission and reception In this section, we cover procedures used for data transmission and reception on the shared channels, and describe in detail the individual steps. Data transmission and reception on the uplink and downlink. Scheduling commands and grants on the PDCCH. DL-SCH and UL-SCH. Physical channel processing of the PDSCH and PUSCH. Hybrid ARQ indicators on the PHICH. Uplink control information on the PUCCH. Uplink demodulation and sounding reference signals. Additional physical layer procedure This section concludes our discussion of the air interface physical layer, by discussing a number of procedures that support its operation. Transmission of the physical random access channel. Contention and non-contention based random access procedures. Discontinuous transmission in idle and connected modes. Uplink power control and timing advance. Air interface layer 2 This section describes the architecture and operation of layer 2 of the air interface protocol stack. MAC protocol, interactions with the physical layer, use for scheduling. RLC protocol, transparent, unacknowledged and acknowledged modes. PDCP, including header compression, security functions and recovery from handover.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
In this masterclass we'll unravel the complexities of the online world, shedding light on the most pressing current and emerging risks and opportunities faced by children and young people, from the perspective of the DSL, as Online Safety Lead.
This one day course will support teachers and RSE leads in special colleges and special schools with post 16 learners to deliver a meaningful curriculum through the Preparing for Adulthood outcomes. The course will explore key issues for older learners, including how to teach about practical aspects of relationships such as attraction and fancying people, starting relationships, negotiation and consent discussions, and how to keep yourself safe. Participants will leave with increased confidence to develop and deliver a skills-based, rights focused curriculum that will empower learners to be able to navigate their personal lives and relationships with autonomy. Aim: To develop confidence to create and deliver an age-appropriate, rights based RSE curriculum for young adults with learning disabilities. Outcomes: Participants will develop understanding of requirements for RSE for older learners, including the statutory guidance and preparation for adulthood outcomes, and how RSE can support independent living consider specific challenges young people with SEND may face in developing relationships and explore practical and creative ways to support relationship skill development explore strategies to address sexualised behaviour, and what to do if a learner begins or wants to masturbate in college Who is this course for? This one day course is ideal for teachers and RSE leads working in special schools and tutors in colleges with older learners, up to age 25, and beyond.
Tech companies don’t just want programmers—they want versatile problem-solvers. The Software Engineering Mini Bundle was built for job-seekers who want to enter or grow within the most in-demand and future-proof industry out there. Whether you're aiming for a junior developer role or transitioning into tech, this bundle equips you with essential hiring power. With a focused skill set in Python, Go Lang, UX, project management, and communication skills, you’re not just learning—you’re leveling up. Software engineering hiring managers are actively looking for candidates who combine back-end fluency with user-first thinking and cross-team coordination. And this bundle delivers all five. Description Job ads in tech are shifting. The new standard isn’t just knowing how to code—it’s knowing Python and Go Lang, designing with UX in mind, managing delivery through project management, and collaborating seamlessly using elite communication skills. The Software Engineering Mini Bundle prepares you for exactly that. In startup environments, your grasp of Go Lang could put you at the heart of microservice infrastructure. In enterprise tech, your fluency in Python opens doors in everything from automation to AI. And across every team—from development to design—UX knowledge, strong communication skills, and agile-friendly project management are no longer optional. Employers are hunting for cross-functional hires who understand the coding language (Python, Go Lang), the user’s experience (UX), the delivery process (project management), and how to collaborate across time zones and departments (communication skills). This bundle combines all of them into one smart, strategic package that screams “hire me.” FAQ What roles does this bundle help me get? Junior developer, backend engineer, software engineer, UX collaborator, QA tester, project coordinator, DevOps assistant, or cross-functional product contributor. Every one of these roles values Python, Go Lang, UX, project management, and communication skills. Why these five topics? Because this is what real-world teams need. Python and Go Lang are among the most sought-after coding languages. UX bridges the gap between dev and design. Project management ensures delivery. And without strong communication skills, you can’t lead, follow, or collaborate effectively in tech. What makes this bundle job-focused? It was created with job listings in mind. Recruiters constantly post openings that demand experience in Python, Go Lang, UX, project management, and solid communication skills. This isn’t theory. This is real skill-building with real hireability.