Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. Relational Databases & Data Models About Data Models About the Relational Model The Electronics Data Model About the Relational DBMS Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper Using the Database Interface About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Introduction to the SQL Language About the SQL Language Characteristics of SQL Introducing SQL Using Select SQL Rules The Select Statement The Select Statement Distinct/Unique Keyword Using Alias Names Restricting Results with the Where Clause About Logical Operators Equality Operator Boolean Operators REGEXP_LIKE() In Operator Sorting Data with the Order By Clause About the Order by Clause Multiple Column Sorts Specify the Sort Sequence About Null Values within Sorts Using Column Aliases Pseudo Columns, Functions & Top-N Queries Rowid Pseudo Column ORA_ROWSCN PSEUDO Column ROWNUM Pseudo Column About the Built-In Functions SYSDATE User & UID SESSIONTIMEZONE Function Using the Dual Table Row Limiting & Top-N Queries FETCH First x Rows Only Clause OFFSET x Rows Clause FETCH?PERCENT Clause The WITH TIES Option Joining Tables About Joins Inner Joins Reflexive Join Non-Key Join Outer Join Using the Set Operators About the Set Operators SQL Set Operator Examples UNION Example INTERECT Example MINUS Example UNION All Summary Functions Using Sub-Queries Finding Data with Sub-Queries Standard Sub-Queries Correlated Sub-Queries The EXISTS Operator Aggregating Data within Groups About Summary Groups Find Groups within the Tables Select Data From the Base Tables Select Groups from the Results Use DDL to Create & Manage Tables Create Table Statement Column Data Types Not Null Default Describe Alter Table Statement Drop Table Statement Table DDL Using SQL Developer Alter User Statement Alter Session Statement NLS_Language NLS_Date Use DML to Manipulate Data The Insert Statement The Delete Statement The Update Statement About Transactions Transaction Rollback Transaction Commit Transaction Savepoint The Set Transaction Statement Set Transaction Read Only Statement Rules Understanding the Data Models The Company Data Model The Electronics Data Model About the SQL-99 Standard SQL-92 & SQL-99 Cross Joins Natural Joins Inner Joins Implicit Inner Join Outer Joins Anti Joins Named Sub-Queries Enhancing Groups with Rollup & Cube Using Rollup The Grouping() Function Using Cube SQL Functions: Character Handling What are the SQL Functions? String Formatting Functions UPPER(), LOWER() Example INITCAP() Example Character Codes Functions CHR((), ASCII() Examples PAD & TRIM Functions RPAD() Example RTRIM() Example TRIM() Example String Manipulation Functions DECODE () Example SUBSTR() Example INSTR() Example TRANSLATE() Example REPLACE() Example String Comparison Functions LEAST() Example Phonetic Search Function SOUNDEX() Example SQL Functions: Numeric Handling About the Numeric Data Functions GREATEST() Example ABS() Example ROUND() Example TRUNC() Example SIGN() Example TO_NUMBER() Example & Data ype Conversions NULL VALUES FUNCTIONS NVL() & NVL2() Function NVL() Example (Character) NVL() Example (Numeric Loss of Data) NVL() Example (Numeric Output) NVL2() Example COALESCE() Function NULLIF() Function SQL Functions: Date Handling Date Formatting Functions TO_CHAR() & TO_DATE() Format Patterns TO_CHAR() Examples TO_DATE() Examples EXTRACT() Example Date Arithmetic Functions MONTHS_BETWEEN() Example ADD_MONTHS() Example LAST_DAY() Example NEXT_DAY() Example TRUNC(), ROUND() Dates Example NEW_ TIME() Example About V$TIMEZONE_NAMES CAST() FUNCTION & TIME ZONES Database Objects: About Database Objects About Database Objects About Schemas Making Object References Database Objects: Relational Views About Relations Views The Create View Statement Why Use Views? Accessing Views with DML Maintaining View Definitions Alter View Drop View DDL Using SQL Developer Database Objects: Indexes About Indexes Create & Drop Index Statements Indexes & Performance Data Dictionary Storage Database Objects: Creating Other Objects About Sequences Referencing NEXTVAL Referencing CURRVAL Within the DEFAULT Clause Alter Sequence & Drop Sequence ALTER SEQUENCE DROP SEQUENCE About Identity Columns CREATE TABLE?GENERATED AS IDENTITY ALTER TABLE?GENERATED AS IDENTITY Start With Limit Value ALTER TABLE...DROP IDENTITY About Synonyms CREATE & DROP SYNONYM Statements CREATE SYNONYM DROP SYNONYM Public Vs Private Synonyms CREATE SCHEMA AUTHORIZATION Database Objects: Object Management Using DDL The RENAME Statement TABLESPACE Placement CREATE TABLE?TABLESPACE The Comment Statement The TRUNCATE TABLE Statement Database Objects: Security About Object Security Grant Object Privileges Revoke Object Privileges Object Privileges & SQL Developer Data Integrity Using Constraints About Constraints NOT NULL Constraint NOT NULL Example CHECK Constraint UNIQUE Constraint PRIMARY KEY Constraint REFERENCES Constraint ON DELETE CASCADE Example ON DELETE SET NULL Example Constraints on Existing Tables Constraints & SQL Developer Managing Constraint Definitions RENAMING & DROPPING Constraints ENABLING & DISABLING Constraints DEFERRED Constraint Enforcement SET CONSTRAINTS Handling Constraint Exceptions Constraints with Views DATA Dictionary Storage The Data Dictionary Structure More About the Data Dictionary OBJECT-SPECIFIC Dictionary Views USER_UPDATABLE_COLUMNS The Dictionary Structure METADATA & SQL Developer Additional course details: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This Tableau Desktop Training course is a jumpstart to getting report writers and analysts with little or no previous knowledge to being productive. It covers everything from connecting to data, through to creating interactive dashboards with a range of visualisations in two days of your time. For Private options, online or in-person, please send us details of your requirements: This Tableau Desktop Training course is a jumpstart to getting report writers and analysts with little or no previous knowledge to being productive. It covers everything from connecting to data, through to creating interactive dashboards with a range of visualisations in two days of your time. Having a quick turnaround from starting to use Tableau, to getting real, actionable insights means that you get a swift return on your investment of time and money. This accelerated approach is key to getting engagement from within your organisation so everyone can immediately see and feel the impact of the data and insights you create. This course is aimed at someone who has not used Tableau in earnest and may be in a functional role, eg. in sales, marketing, finance, operations, business intelligence etc. The course is split into 3 phases and 9 modules: PHASE 1: GET READY MODULE 1: LAUNCH TABLEAU Check Install & Setup Why is Visual Analytics Important MODULE 2: GET FAMILIAR What is possible How does Tableau deal with data Know your way around How do we format charts Dashboard Basics – My First Dashboard MODULE 3: DATA DISCOVERY Connecting to and setting up data in Tableau How Do I Explore my Data – Filters & Sorting How Do I Structure my Data – Groups & Hierarchies, Visual Groups How Tableau Deals with Dates – Using Discrete and Continuous Dates, Custom Dates Phase 2: GET SET MODULE 4: MAKE CALCULATIONS How Do I Create Calculated Fields & Why MODULE 5: MAKE CHARTS Charts that Compare Multiple Measures – Measure Names and Measure Values, Shared Axis Charts, Dual Axis Charts, Scatter Plots Showing Relational & Proportional Data – Pie Charts, Donut Charts, Tree Maps MODULE 6: MAKE TABLES Creating Tables – Creating Tables, Highlight Tables, Heat Maps Phase 3: GO MODULE 7: ADD CONTEXT Reference Lines and Bands MODULE 8: MAKE MAPS Answering Spatial Questions – Mapping, Creating a Choropleth (Filled) Map MODULE 9: MAKE DASHBOARDS Using the Dashboard Interface Dashboard Actions This training course includes over 25 hands-on exercises and quizzes to help participants “learn by doing” and to assist group discussions around real-life use cases. Each attendee receives a login to our extensive training portal which covers the theory, practical applications and use cases, exercises, solutions and quizzes in both written and video format. Students must use their own laptop with an active version of Tableau Desktop 2018.2 (or later) pre-installed. What People Are Saying About This Course “Excellent Trainer – knows his stuff, has done it all in the real world, not just the class room.”Richard L., Intelliflo “Tableau is a complicated and powerful tool. After taking this course, I am confident in what I can do, and how it can help improve my work.”Trevor B., Morrison Utility Services “I would highly recommend this course for Tableau beginners, really easy to follow and keep up with as you are hands on during the course. Trainer really helpful too.”Chelsey H., QVC “He is a natural trainer, patient and very good at explaining in simple terms. He has an excellent knowledge base of the system and an obvious enthusiasm for Tableau, data analysis and the best way to convey results. We had been having difficulties in the business in building financial reports from a data cube and he had solutions for these which have proved to be very useful.”Matthew H., ISS Group
This course is aimed at those who analyse and identify asbestos from within samples collected on site
No-one in business will succeed if they are not financially literate - and no business will succeed without financially-literate people. This is the ideal programme for managers and others who don't have a financial qualification or background but who nonetheless need a greater understanding of the financial management disciplines essential to your organisation. This course will give the participants a sound understanding of financial reports, measures and techniques to make them even more effective in their roles. It will enable participants to: Overcome the barrier of the accountants' strange language Deal confidently with financial colleagues Improve their understanding of your organisation's finance function Radically improve their planning and budgeting skills Be much more aware of the impact of their decisions on the profitability of your organisation Enhance their role in the organisation Boost their confidence and career development 1 Review of the principal financial statements What each statement containsOutlineDetail Not just what the statements contain but what they mean Balance sheets and P&L accounts (income statements) Cash flow statements Detailed terminology and interpretation Types of fixed asset - tangible, etc. Working capital, equity, gearing 2 The 'rules' - Accounting Standards, concepts and conventions Fundamental or 'bedrock' accounting concepts Detailed accounting concepts and conventions What depreciation means The importance of stock, inventory and work in progress values Accounting policies that most affect reporting and results The importance of accounting standards and IFRS 3 Where the figures come from Accounting records Assets / liabilities, Income / expenditure General / nominal ledgers Need for internal controls 'Sarbox' and related issues 4 Managing the budget process Have clear objectives, remit, responsibilities and time schedule The business plan Links with corporate strategy The budget cycle Links with company culture Budgeting methods'New' budgetingZero-based budgets Reviewing budgets Responding to the figures The need for appropriate accounting and reporting systems 5 What are costs? How to account for them Cost definitions Full / absorption costing Overheads - overhead allocation or absorption Activity based costing Marginal costing / break-even - use in planning 6 Who does what? A review of what different types of accountant do Financial accounting Management accounting Treasury function Activities and terms 7 How the statements can be interpreted What published accounts contain Analytical review (ratio analysis) Return on capital employed, margins and profitability Making assets work - asset turnover Fixed assets, debtor, stock turnover Responding to figures EBIT, EBITEDIA, eps and other analysts' measure 8 Other key issues Creative accounting Accounting for groups Intangible assets - brand names Company valuations Fixed assets / leased assets / off-balance sheet finance
The main subject areas of the course are: Good practice in asbestos removal or remediation Asbestos Removal Control Plans Air sampling for asbestos Enclosures, clearance air monitoring and reporting
The main subject areas of the course are: Good practice in asbestos removal or remediation Asbestos Removal Control Plans Air sampling for asbestos Enclosures, clearance air monitoring and reporting
Duration 3 Days 18 CPD hours This course is intended for This course is designed for operators and schedulers who perform duties that are related to batch workload automation. Overview In this course, you learn how to perform the following tasks:Explain the production terminology used with IBM Workload Scheduler and its production planning processMonitor production batch workload processesManage production batch workloadCreate and modify scheduling objectsSchedule new workloadsForecast future workloadsMigrate workload definitions from test to production environmentsCreate and maintain reports about production workloads This course provides professional report authors an opportunity to learn report building techniques using relational data models. Demonstrations and exercises will illustrate and reinforce key concepts during this learning opportunity. IBM Workload Scheduler Introduction About Workload Automation IBM workload automation offerings IBM Workload Scheduler terminology Workload Scheduler user interfaces Getting started with Application Lab Getting started with the Dynamic Workload Console Connecting the console to Workload Scheduler Getting started with the command-line interfaces Using the Application Lab Interface Using the processes status overview page Managing processes Using other Application Lab functions Monitoring Workload Scheduler Production Monitoring Workload Scheduler production by using queries Using the Workload Dashboard Monitoring system status and health Monitoring plan objects Using the What-if Analysis interface Monitoring the plan graphically Managing Workload Scheduler Production Managing the scheduling environment Managing scheduling objects in the plan Creating Scheduling Objects Using the Workload Designer Creating scheduling objects Creating variables and variable tables Creating prompts and resources Creating calendars Defining jobs Scheduling, Forecasting, and Migrating Workloads Creating job streams Applying jobs to job streams Setting time and date restrictions Using advanced scheduling options Creating job stream definitions by using composer Creating and using event rules Forecasting and previewing future dates Exporting and importing scheduling definitions Using Workload Application Templates Reporting with Workload Scheduler Using reporting features Using Common Reporting with Workload Scheduler Using the batch reporting utility Using the preformatted text-based report utilities
Overview This course covers distressed debt analysis and investing, focusing primarily on corporates but also including financial institutions and sovereign debt as special topics. The programme begins with the foundations of the distressed debt market, causes of and early warning signals, possible outcomes and how to evaluate the probability of outcomes in different scenarios. Restructuring is reviewed in detail, as well as estimation of sustainable debt levels, business valuation and the importance of capital and group structure. Differences between active control and passive non-control investments are highlighted, including stakeholder tactics and due diligence. Case studies cover a variety of companies across sectors and geographies, challenging delegates to make investment decisions on real distressed debt situations. Who the course is for Distressed debt investors, Loan portfolio managers and Private equity investors Hedge fund managers High yield credit analysts and Equity analysts High yield asset managers and Mergers and acquisitions bankers Debt capital markets/leveraged finance bankers Business turnaround/restructuring accountants/corporate finance professionals Lawyers Strategy consultants Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for anyone who works on WebSphere related applications and projects, including administrators, IBM Business Partners, independent software vendors (ISVs), and consultants. Overview The objectives for this course are as follows:Use IBM Support Assistant to organize and analyze problem artifactsUse problem determination techniques to identify common problemsApply problem investigation approaches such as analysis and isolationGather diagnostic data problem artifacts by using administrative toolsTroubleshoot JVM-related problems such as hung threads, out of memory issues, and crashesUse IBM Support Assistant to run tools that analyze diagnostic dataIdentify and troubleshoot common problems with database connectionsConfigure and tune database connection poolsTroubleshoot WebSphere security problems associated with authentication, authorization, SSL, and Java 2 policiesIdentify and resolve Java EE application deployment problemsTroubleshoot HTTP request flow problems from web server to web containerIdentify and resolve application server startup failuresTroubleshoot problems associated with WebSphere default messaging and SI busTroubleshoot WebSphere installation problemsUse Intelligent Management features to configure health policies and tasksCommunicate effectively with IBM support teams This course teaches you how to manage WebSphere Application Server problems more skillfully within your organization by using problem determination tools and techniques. Outline Course introduction Overview of WebSphere Application Server systems and components Using the IBM Support Assistant Team Server 5.0 Exercise: Using the IBM Support Assistant Team Server 5.0 Problem determination methods Gathering diagnostic data Exercise: Gathering diagnostic data Introduction to JVM-related problems Exercise: Introduction to configuring garbage collection policies How to troubleshoot hangs Exercise: Troubleshooting hung threads How to troubleshoot crashes Exercise: Troubleshooting crashes Introduction to WebSphere out-of-memory problems Exercise: Troubleshooting an out-of-memory condition Introduction to database connection problems Exercise: Troubleshooting database connection problems Tuning and connection pool management problems Exercise: Troubleshooting a connection leak WebSphere security configuration problems Exercise: Troubleshooting security problems Application deployment problems Server start failures Exercise: Troubleshooting server start failures Request flow and web container problems Exercise: Troubleshooting request flow and web container problems Default messaging provider problem determination Exercise: Troubleshooting WebSphere default messaging WebSphere installation problems when using IBM Installation Manager Intelligent Management problem determination and problem determination tools Exercise: Configuring health management policies Course summary