• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1642 Basic courses in Sheffield delivered Live Online

AN202 IBM Korn and Bash Shell Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. Basic shell conceptsFlow control in a shell ScriptFunctions and typesetShell features such as arithmetic and string handlingUsing regular expressionsUsing sed, awk and other AIX utilities

AN202 IBM Korn and Bash Shell Programming
Delivered OnlineFlexible Dates
Price on Enquiry

CCTA Check Point Troubleshooting Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTA Check Point Troubleshooting Administration
Delivered OnlineFlexible Dates
Price on Enquiry

German Language Course for Beginners

By NextGen Learning

Course Overview The German Language Course for Beginners is designed to provide a comprehensive introduction to one of the world’s most widely spoken languages. Whether for travel, work, or personal enrichment, this course offers a solid foundation in speaking, reading, writing, and understanding German. Learners will gain essential communication skills, from everyday greetings to basic conversations, allowing them to navigate a variety of real-world situations confidently. The course focuses on developing vocabulary, pronunciation, sentence construction, and listening comprehension through engaging and accessible lessons. By the end of the course, learners will be able to understand and communicate basic ideas in German, laying the groundwork for further study or everyday interactions. This course is ideal for those seeking a structured and supportive environment to start their German language journey and aims to deliver practical outcomes that can be applied across travel, education, and professional settings. Course Description The German Language Course for Beginners offers an engaging exploration into the fundamentals of German communication. Through a series of structured lessons, learners will cover key topics such as introductions, numbers, days of the week, everyday vocabulary, basic grammar rules, verb conjugations, and common expressions. The course presents material in a logical progression to ensure that learners build confidence step-by-step, with an emphasis on pronunciation and conversational fluency. Interactive exercises, cultural insights, and simple dialogues enhance the learning experience, fostering both comprehension and retention. By participating in this course, learners will acquire the foundational skills necessary to engage in basic conversations, understand simple written texts, and grasp the structure of the German language. Designed for complete beginners, this programme offers a supportive and stimulating learning environment, making it a valuable stepping stone for further language study, career development, or international travel. Course Modules Module 01: Introduction to the German Language Module 02: German Alphabet and Pronunciation Module 03: Basic Greetings and Introductions Module 04: Numbers, Dates, and Time Module 05: Essential Vocabulary for Everyday Situations Module 06: Basic Grammar: Articles, Nouns, and Verbs Module 07: Forming Simple Sentences and Questions Module 08: Common Phrases and Daily Expressions Module 09: Introduction to German Culture and Customs (See full curriculum) Who is this course for? Individuals seeking to learn German for personal, educational, or travel purposes. Professionals aiming to enhance their career prospects through multilingual skills. Beginners with an interest in European languages and cultures. Students preparing for further German language studies or international opportunities. Career Path Tourism and Hospitality Sector Roles International Customer Support Positions Language Tutoring or Educational Support Translation and Interpretation Assistance Administrative and Office Roles in International Companies

German Language Course for Beginners
Delivered OnlineFlexible Dates
£9.99

Cisco Networking

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level network administrators, network support and help desk technicians. Overview Upon successful completion of this course, students will be able to build, connect and manage networks, and IP traffic routing. In this course the student will learn to install, operate, configure and secure basic and enterprise networks. Networking BasicsNetworking ModelsNetwork AddressingPacket DeliveryDevice ManagementNetwork Security BasicsAdvanced Network Security with ACLsSwitchesAdvanced Switching ConceptsRoutersAdvanced Routing ConceptsBasic Network ServicesCisco Device ManagementTroubleshooting and Data CollectionAdvanced Switch RedundancyOSPF ConfigurationEIGRP ConfigurationPPP WANsFrame Relay WANsSecure VPNs and Tunneling Additional course details: Nexus Humans Cisco Networking training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Networking course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Networking
Delivered OnlineFlexible Dates
Price on Enquiry

Online Adobe Photoshop Training for Beginners

By Greta Powell Training

Adobe Photoshop Training Course for Beginners. A one to one private Photoshop Course on a 24 /7 basis to suit your hours.

Online Adobe Photoshop Training for Beginners
Delivered OnlineFlexible Dates
£200

Adobe Photoshop Training Course - Private Photoshop Tuition Weekends

By Greta Powell Training

This Adobe Photoshop Course runs over the weekend on either a Saturday or Sunday for beginners. Learn Photoshop from scratch.

Adobe Photoshop Training Course - Private Photoshop Tuition Weekends
Delivered OnlineFlexible Dates
£200

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe After Effects Fast-Track Course (Live Online)

By ATL Autocad Training London

Adobe After Effects Fast-Track Course (Live Online) through our comprehensive course, beginners, intermediate, and advanced learners. Perfect your skills at the top Training Centre in the UK. Dive into motion graphics and animation with hands-on training led by expert tutors ensuring a practical and interactive learning experience. Click here for more info: Website Duration: 5 hours Approach: Personalized 1-on-1sessions and Customized content. Schedule: Select your preferred hour from Monday to Saturday between 9 am and 7 pm. Adobe After Effects Essentials (5-hour course) Session 1: Introduction to After Effects (1 hour) Overview of After Effects and its applications in motion graphics and visual effects. Understanding the workspace and interface. Importing and organizing assets for seamless workflow. Creating projects and compositions. Session 2: Animation Basics (1.5 hours) Working with layers: Adding, editing, and arranging layers in the timeline. Keyframe animation: Introduction to keyframes and creating simple animations. Motion paths: Manipulating motion paths for dynamic animations. Easing motion: Applying ease in and ease out to smoothen animations. Animation presets: Utilizing built-in presets for efficient animation. Session 3: Effects and Compositing (1.5 hours) Applying effects: Adding visual effects to layers and compositions. Compositing techniques: Understanding blending modes and layer styles. Masking and track mattes: Using masks to control the visibility of layers and apply effects. Motion tracking: Applying tracking data to objects in a scene. Session 4: Text and Shape Animation (1 hour) Text animation: Creating and animating text layers with different styles. Shape layers: Introduction to shape layers and their applications. Animating shapes: Using shape layers to create dynamic animations. Session 5: Final Project and Exporting (1 hour) Applying all the learned techniques to create a final motion graphics project. Refining the project and adding finishing touches. Understanding export settings and rendering the final output. Read the usefull Blogs https://realanimationworks.com/government-funded-interior-design-courses-in-london-your-path-to-creative-excellence/ Upon completing the Adobe After Effects Essentials course, participants will: Master the Interface: Understand After Effects' layout, tools, and key functionalities, gaining confidence in navigating the software. Animation Proficiency: Gain expertise in animating images, videos, and text layers using keyframes, easing techniques, and smooth transitions. Effects Application: Learn to apply, customize, and animate various visual effects, enhancing the overall visual appeal of multimedia projects. Masking and Precision Editing: Master the art of creating and animating masks for detailed and accurate editing, enabling seamless integration of visual elements. Advanced Compositing Skills: Explore advanced compositing techniques for combining multiple elements seamlessly, achieving professional-level visual integration. Export and Rendering Mastery: Understand export settings, ensuring optimal video quality for diverse output formats. Learn the art of efficient rendering for polished final products. Certificate of Completion: Receive a certificate validating the successful completion of the course, showcasing newfound skills to potential employers or clients. Practical Knowledge: Acquire practical insights and techniques applicable to real-world projects, ensuring the ability to create visually captivating multimedia content independently. Lifetime Learning Support: Benefit from lifetime email support, enabling continuous learning and assistance with any post-course queries or challenges. After Effects CC Training: From Novices to Experts Immerse yourself in the world of motion graphics and VFX with our Adobe Certified After Effects Courses, suitable for total novices and experts alike. Learn to create captivating motion graphics, smooth animations, and stunning special effects in a professional environment. Choose from four learning options: London Classroom: Attend in-person sessions 1-2-1 in our dynamic studio. Live Online Classes: Join interactive classes from the comfort of your home or office. Bespoke Training: Tailor the course to your specific needs and preferences. Whichever path you select, all options cover the same lesson plan delivered by our Certified Professional Trainers. Rest assured, your learning experience is fully supported by our 100% Satisfaction Guarantee. Personalized After Effects Training: Tailored for You! Custom one-on-one sessions, in-person or online. Work with your files, learn at your pace. Expert trainers in London. Team training available. Benefits: Unlimited post-course support via phone/email. Access to training materials and a handbook. Free pre-course consultation. Achieve impressive results: create captivating videos, animated logos, and more. Master cinematic effects and enhance your visual storytelling skills.

Adobe After Effects Fast-Track Course (Live Online)
Delivered OnlineFlexible Dates
£216

FortiGate Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)

FortiGate Security
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry