Our regionally-based associate AutoCAD trainers come to your organisation to deliver small-group training when you need and at the level you require. Or, opt for live virtual classroom courses delivered via Microsoft Teams. One of our trainers will speak to you about the scope of your requirement and course lengths may vary depending upon your needs. Course Outlines AutoCAD 2D Beginners - 2 days AutoCAD 2D Intermediate - 2 days AutoCAD 3D Beginners - 1 day Advance Steel Beginners - 2 days Pricing £800.00 plus VAT per day for up to 6 learners and £125.00 plus VAT per day to cover travel and accommodation within mainland UK. Just add £50.00 plus VAT per additional learner up to the 8delegate maximum.
FourSquare Training specialise in private, corporate Power BI courses delivered at your premises and tailored to your needs.
A four-hour workshop for HR Professionals in the area of Attraction, Selection and Recruitment of Neurodiverse people.
QA Level 2 Award In Principles Of COSHH (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration COSHH: Control of Substances Hazardous to Health Regulations 2002 Hazardous substances are everywhere, and COSHH assessments have to be undertaken in all businesses Run in an engaging and interactive way - see the video below Course Contents: Legal requirements relating to hazardous substances in the workplace Employer duties Employee duties Consequences of non-compliance Communicating safety information The different forms that hazardous substances can take Effects that may arise after exposure to hazardous substances The different routes that hazardous substances can enter the body How risk assessments reduce accidents and ill health at work The five step process of risk assessment The control hierarchy in relation to the safe use, handling, transporting, storage and disposal of substances hazardous to health Information to refer to when identifying and using hazardous substances Procedures for dealing with an incident involving hazardous substances Benefits of this course: COSHH stands for the 'Control of Substances Hazardous to Health' and falls under the Control of Substances Hazardous to Health Regulations 2002 This half day course is for all those who work, or wish to work, in a workplace that works with hazardous substances, such as in healthcare, in the manufacturing sector, cleaners, transport, utilities and even office environments Hazardous substances are everywhere, and COSHH assessments have to be undertaken in all businesses Candidates will learn about the legal requirements relating to hazardous substances, how risk assessments contribute to the safe use of hazardous substances, as well as the precautions and procedures required to ensure that the risks associated with hazardous substances are properly controlled Accredited, Ofqual regulated qualification: This QA Level 2 Award in Principles of COSHH (RQF) Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Principles of COSHH Certificate fulfills the legal requirements and is a very good way to make sure you and your employees are trained appropriately.The Ofqual Register number for this course is 603/0775/4
This training focuses on performance management as a continuous process that drives development. It helps bring consistency in applying performance management within the business. The course will help managers recognise their role and contribution to effectively manage performance and conduct at work.
Practical Sales Skills 1 Day Workshop in Elgin
Practical Sales Skills 1 Day Workshop in St Andrews
Practical Sales Skills 1 Day Workshop in Cardiff
Practical Sales Skills 1 Day Workshop in Manchester
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.