FourSquare Training specialise in private, corporate Microsoft Word courses delivered at your premises and tailored to your needs.
The European Society of Aesthetic Gynecology | ESAG is delighted to present Hands On, Live Cases Training Courses on Surgical Female Genitalia Cosmetic Procedures with a fully rejuvenated scientific program Alexandros Bader, MD, FAAOCG, FAACS Ob&Gyn Consultant (London - Dubai) Specialist Pelvic Floor Reconstruction – Cosmetic Gynecology President and Founder of the European Society of Aesthetic Gynecology –ESAG Founder and Co-director of the Bader Medical Institute of London Associate researcher at University of Oxford-UK SURGICAL Hands-On Training: December 11th to 13th: This is a unique opportunity to work side-by-side with Dr Bader, pioneer in the field of aesthetic gynecology and one of the finest Surgeons in the world in the field Of Reconstructive and Aesthetic Gynecology. A surgeon who counts more than 3500 surgical procedures in his portfolio for the last 15 years. Theory of Surgical Cosmetic & Aesthetic Gynecology Hands on, Live cases training on Surgical Female Genital Cosmetic & Reconstructive Gynecology procedures Covered Surgical Topics: · Labia Minora Plasty · Labia Majora Plasty · Clitoral Hoodectomy · Vaginal Tightening with Single Thread technique · Fat grafting to genital area
FourSquare Training specialise in private, corporate Microsoft PowerPoint courses delivered at your premises and tailored to your needs.
FourSquare Training specialise in private, corporate Microsoft 365 courses delivered at your premises and tailored to your needs.
FourSquare Training specialise in private, corporate Google Sheets courses delivered at your premises and tailored to your needs.
FourSquare Training specialise in private, corporate Microsoft Excel courses delivered at your premises and tailored to your needs.
FourSquare Training specialise in private, corporate Microsoft Teams courses delivered at your premises and tailored to your needs.
Database fundamentals training course description This three-day training course helps you prepare for Microsoft Technology Associate Exam 98-364, and build an understanding of these topics: Core Database Concepts, Creating Database Objects, Manipulating Data, Data Storage, and Administering a Database. What will you learn Describe core database concepts. Create database objects. Manipulate data. Describe data storage. Administer a database. Create a relational database consisting of 3 related tables. Database fundamentals training course details Who will benefit: Those working with databases. Prerequisites: None. Duration 3 days Database fundamentals training course contents Understanding core database concepts Flat-type databases, hierarchical databases, relational databases, database fundamentals, relational database concepts, using the SQL Server Management Studio Interface. Data Manipulation Language (DML), Data Definition Language (DDL), using DDL statements. Creating database objects Defining data types, using built-in data types, using exact numeric data types, using approximate numeric data types. Creating and using tables. Creating views. Creating stored procedures, SQL injections. Manipulating data Using Queries to select data, combining conditions, using the BETWEEN clause, using the NOT clause, using the UNION clause, using the EXCEPT and INTERSECT clauses, using the JOIN clause. Using Queries to insert data, Inserting data. Updating data and databases, Using the UPDATE statement. Deleting data, Using the DELETE statement, truncating a table with TRUNCATE TABLE, deleting a table with DROP TABLE, using referential integrity. Understanding data storage Normalising a database, normalization, first normal form, second normal form, third normal form, fourth normal form, fifth normal form. Primary, foreign and composite keys, clustered and non-clustered indexes, creating a non-clustered table. Administering a Database Securing Databases, server-level security, database-level security, Windows security, SQL authentication, database server roles, granting access to a database, fixed database roles, object permissions, managing roles, ownership chains, reviewing a sample security model. Backing up and restoring databases, recovery models, backup devices.
CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.
FourSquare Training specialise in private, corporate Microsoft Project courses delivered at your premises and tailored to your needs.