Live online course with study materials and certificate of completion included This HTML course will provide you with an easy to follow, hands-on introduction to HTML and CSS, the basic coding languages which drive the internet. Participants will learn how to create an attractive and well-structured web page using basic HTML and CSS. This workshop is highly recommended for anyone wishing to learn how to create websites and also for people who already use applications such as Dreamweaver or WordPress and need more control over their web output. Resources Introduction to HTML & CSS Course Information Description Completing this course will enable you to do the following and more: Understand what HTML and CSS are and how they work together Learn basic HTML elements Learn how to create hyperlinks Work with images Use DIVs, forms and lists to arrange content Create page structure Use Cascading Style Sheets to control the layout and look of HTML elements Use Developer Tools to preview CSS changes Know how and when to use Inline CSS Create code that is both readable, compliant with HTML5 standards Understand what makes good SEO For the full course content please download the course information pdf listed above. Who is this course for? This workshop is suitable for anyone with basic PC or Mac skills who wants to understand how the web works. No previous knowledge or experience of HTML or CSS is necessary. Requirements Attendees should have basic PC or Mac skills. You will need a broadband internet connection to participate in this live online course. Certificates Certificate of completion Digital certificate - Included
This Python Machine Learning online instructor led course is an excellent introduction to popular machine learning algorithms. Python Machine Learning 2-day Course Prerequisites: Basic knowledge of Python coding is a pre-requisite. Who Should Attend? This course is an overview of machine learning and machine learning algorithms in Python SciKitLearn. Practical: We cover the below listed algorithms, which is only a small collection of what is available. However, it will give you a good understanding, to plan your Machine Learning project We create, experiment and run machine learning sample code to implement a short selected but representative list of available the algorithms. Course Outline: Supervised Machine Learning: Classification Algorithms: Naive Bayes, Decision Tree, Logistic Regression, K-Nearest Neighbors, Support Vector Machine Regression Algorithms: Linear, Polynomial Unsupervised Machine Learning: Clustering Algorithms: K-means clustering, Hierarchical Clustering Dimension Reduction Algorithms: Principal Component Analysis Latent Dirichlet allocation (LDA) Association Machine Learning Algorithms: Apriori, Euclat Other machine learning Algorithms: Ensemble Methods ( Stacking, bagging, boosting ) Algorithms: Random Forest, Gradient Boosting Reinforcement learning Algorithms: Q-Learning Neural Networks and Deep Leaning Algorithms: Convolutional Network (CNN) Data Exploration and Preprocessing: The first part of a Machine Learning project understands the data and the problem at hand. Data cleaning, data transformation and data pre-processing are covered using Python functions to make data exploration and preprocessing relatively easy. What is included in this Python Machine Learning: Python Machine Learning Certificate on completion Python Machine Learning notes Practical Python Machine Learning exercises and code examples After the course, 1 free, online session for questions or revision Python Machine Learning. Max group size on this Python Machine Learning is 4. Refund Policy No Refunds
OVERVIEW Prerequisites—DIAD training or equivalent working experience This one-day course will cover using Power BI Desktop to import and shape data from a variety of sources. It will also walk through Power BI capabilities you can use to enhance the data model for your business users. The course covers key aspects of how to create a great data model to meet your business needs, various features in Power BI used to enhance data models so you can build great reports, and an introduction to DAX to create calculations. After completing this training, the attendees should be able to import data from a variety of data sources into Power BI, shape the data, create the data model, and write DAX functions to the Power BI model. COURSE BENEFITS: Understand the Power BI Desktop data model, its components and most effective schemas Describe concepts of calculated columns and measures Create queries using M Create calculations with DAX Understand the use of functions Create and optimize a data model Understand the consequences of data model design decisions WHO IS THE COURSE FOR? Power BI report developers who wish to improve the structure of their data models Power BI report developers who wish to use advanced features like parameters and M coding in Power Query Power BI practitioners who wish to optimise their models more effectively Attendees wishing to prepare thoroughly for the DAX In A Day course COURSE OUTLINE Module 1 Getting And Shaping The Data Understand what is meant by data model in the context of Power BI Understand the consequences of data model design decisions Understand consequences of Power BI’s data type handling Understand data connection options Module 2 Basic Data Modelling Understand basic data modelling Understand basic data model types Explore dimension tables and fact tables Explore data connections Module 3 Getting Started With M (Power Query Language) Get introduced to M Understand key components and syntax Module 4 Understanding Logic Operators Understand Transformations Understand Join operation Module 5 Introduction To DAX Get introduced to DAX and how can it be used Understand working with parameters and DAX (lab combining the previous module) Module 6 Working With Functions - DAX CALCULATE And More Understand working with functions Understand the basics of the CALCULATE formula Module 7 Modelling With Power BI & DAX Best Practice Gain familiarity with basic data modelling for business scenarios Learn some best practices for working with Power BI
Course description Figma is an industry leading web-based design tool that allows you to create user interfaces for any screen type or size, collaborate on those designs in real-time and build interactive prototypes suitable for user testing. Figma is a visual design tool so there’s no coding involved. Design is achieved by adding, combining and styling shapes, text and images on a canvas or ‘Frame’. We run 2 consecutive Figma training days, the second day building on the practical activities from the first. You can attend just the first day. Attending just the second day is only recommended if you’re already very comfortable with the Figma interface. Day 1: Basic Figma design and collaboration For beginners with no prior experience with Figma who want to understand the basics, be able to create their own designs, share, collaborate and even iterate on the designs of others. You will learn: How to navigate the Figma interface. How to create your own designs by: Setting up a design file. Setting up the screen type you want to design and add grids and guides. Adding and modifying basic shapes and text to create user interface elements. How to save text and colour styles for reuse. How to create reusable components. How to use the ‘auto layout’ feature to promote tidy, consistent and usable design. How to collaborate on designs by sharing screens and commenting on designs. A brief introduction to prototyping: What’s possible. What’s not. Day 2: Component variants, design systems and prototyping This session will cover the more sophisticated aspects of Figma use such as: How to use component variants to create: Interaction styles such as hover and mouse down states ‘Flavours’ of a widget such as primary and secondary button styles. Toggleable elements within a widget such as buttons or bullets within a product card. How to turn a collection of components into a basic design system. Prototyping fundamentals: How to make journeys clickable. How to introduce animations. Tips and tricks for effective user testing. The limitations of Figma prototyping Is it for you? With no experience of Figma necessary, this course is suitable if: If you’re involved with creating or curating digital experiences. if you want to turn your design ideas into something tangible. If you work with Figma designers and want to understand the ‘art of the possible’. If you want to collaborate with your team on Figma projects. Learning objectives After completing day 1 you will be able to: Understand the Figma user interface. Create mobile and desktop interface designs. Effectively collaborate remotely. Share designs and gather feedback. Use auto layout to promote consistent and usable designs. Understand Figma’s role in user experience design, and its limitations. After day 2 you will be able to: Understand how design systems are set up and used. Create component variants for use in your own design system. Use that design system to efficiently create a user journey. Create a prototype suitable for user testing.
Duration 3 Days 18 CPD hours Discover and explore how to use the fundamental building blocks of the Swift programming language. class will teach you the basic concepts of Swift programming, including syntax, logic, structures, functions, and patterns. It also includes detailed explanations of language syntax and coding exercises. Introduction to Swift Constants, Variables, and Data TypesOperatorsControl FlowStrings & FunctionsStructures & ClassesOptionalsCollectionsLoopsType CastingGuard StatementsScope & EnumerationsProtocolsClosuresExtensions
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Maximize the value of data assets in the oil and gas sector with EnergyEdge's assessment-based training course on Python programming and analytics.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options