If you are new to qualitative research or if you want some initial help to engage with the materials appropriately, then this webinar programme is for you. Doing Qualitative Research is a free curated resource we developed that takes researchers through the whole research cycle, not just the analysis. There is a heavy emphasis on what it is like to 'do' qualitative research in a robust, ethical and professional manner, with practical exercises and reflexive tasks suggested throughout. We are running two, one-hour webinars together with asynchronous, self-directed engagement with the course materials, to help a peer-group of researchers work through the resources on the parts of the qualitative research process they need help with. We understand that not everyone needs to cover the same materials and concepts, or at the same pace. In the first station, discussion with your peers and the facilitator, will help you choose which parts of the Doing Qualitative Research course to focus on before the second webinar. The concluding webinar uses group work and discussion for you to additionally practice one of the most important aspects of the qualitative research paradigm; reflexivity. You will identify what you have learned and how this affects what you will do next with your learning and research. The webinars are facilitated by our Qualitative Research Specialist Dr Cathy Gibbons. Cathy has almost 20 years' experience of teaching qualitative methods across a wide spectrum of disciplines within and beyond the social sciences. The session is free, and runs as two 2hr sessions, 2 weeks apart.
Duration 5 Days 30 CPD hours This course is intended for For those seeing to prepare for CCIE Enterprise Infrastructure certification Overview This course will help prepare for CCIE Enterprise Infrastructure certification The new CCIE Enterprise Infrastructure certification program prepares you for today?s expert-level job roles in enterprise infrastructure technologies. CCIE Enterprise Infrastructure now includes automation and programmability to help you scale your enterprise infrastructure. VTP VTP and different versions Pruning EtherChannel LACP Layer 2 and Layer 3 Spanning Protocol 1d, 802.1w, and 802.1s SPAN, RSPAN, and ERSPAN DMVPN All Phases Redundancy: Two Clouds One Hub Two Hubs one Cloud Two hubs two Clouds Running Routing Protocols DMVPN over MPLS EIGRP RD, CD, S, FC, FS, and FD Configuration, and hidden debugging Authentications: MD5, and SHA, Summarization Load Balancing:Equal Cost, Unequal Cost, Add-Path, Filtering, Default Route Injection Optimization: Query Propagation Boundary, IP FRR, STUB routing (All Options) Metric: Classic, Wide Metric Route Tags: Decimal and Dotted-Decimal Notations, OTP OSPFv2 Overview and special cases GRE or Virtual-Links LSAs, FA, and RFCs (1583, 1587, 2328, 3101, 5185 and many more) Best Path Selection Network Types Area Types Optimization: GTSM, LFA, Default Route Injection Authentication: RFC 2328, RFC 5709, Summarization, Filtering BGP States Establishing a Peer Session: Regular method,Peer-Groups,Templates,Best Path Selection Attributes: Weight, AS-Path, Origin, Next-Hop, Local-Preference, Atomic-Aggregate Communities, Aggregator, and MED Load Balancing: Equal Cost,Unequal Cost,Conditional Advertisement,Out/In Bound Route Filtering and the order,ORF,Multihoming Scenarios AS-Path Manipulation: Regexp,Local-as,Allow-as,Remove-Private-as Convergence and Scalability: Route Reflectors,Confederation,Aggregation (All Options) Other BGP Features: MultiPath,Add-Path,Route-Refresh,Soft Reconfiguration IPv6 Acquiring an IPv6 Address: IPv6 General Prefix SLAAC DHCPv6 Rapid-Commit Relay Prefix Delegation IPv6 and DMVPN EIGRPv6 OSPFv3: Both flavors, LSAs, RFCs BGP for IPv6: IPv6 transport, and IPv4 route exchange Transitional Solutions: NAT-PT,6VPE,Multicast,MLD,Static RP,BSR,Embedded RP,IPv6 Traffic Filters,RA Guard,ND Inspection MPLS LDP, VRFs, RD, and RT L3VPNs Route Leaking PE to CE Routing Security Control Plane Policing VACLs Storm Control DHCP Snooping IP Source Guard DAI Private VLANs Port Security Access-lists uRPF Device Tracking IPsec Identity Use Case For FlexVPN: Site-to-Site, IKEv1, and IKEv2 Using Preshared Keys 1x Port Base Authentication : Device Roles,Port States,Authentication Process,Host Modes Network Services FHRP: HSRP, VRRP, and GLBP NAT: Static NAT, and PAT,Dynamic NAT,Policy-Base NAT,VRF-Aware NAT,VASI NAT Software Defined Infrastructure Cisco SD Access: Design a Cisco SD Access solution Underlay network (IS-IS, manual/PnP) Overlay fabric design (LISP, VXLAN, Cisco TrustSec) Fabric domains (single-site and multi-site using SD-WAN transit) Cisco SD Access deployment: Cisco DNA Center device discovery and device management Add fabric node devices to an existing fabric Host onboarding (wired endpoints only) Fabric border handoff Segmentation Macro-level segmentation using VNs Micro-level segmentation using SGTs (using Cisco ISE) Assurance Network and client health (360) Monitoring and troubleshooting Cisco SD-WAN: Design a Cisco SD-WAN solution Orchestration plane (vBond, NAT) Management Plane (vManage) Control Plane (vSmart, OMP) Data Plane (vEdge/cEdge) WAN edge deployment Onboarding new edge routers Orchestration with zero-touch provisioning/PnP OMP TLOC Configuration templates Localized policies (only QoS) Centralized policies Application aware Routing Topologies
This course is developed for staff and volunteers to raise awareness of drug and alcohol misuse issues and are adequately informed and enabled to work effectively with individuals with dependencies.
Virtual course for parents of adult children at risk/pre manifest. We are pleased to invite you to our virtual course for parents of adult children at risk/pre manifest. This is an opportunity to improve your knowledge of the issues surrounding your adult child at risk, share your experiences and gain ideas of support available for yourself and your adult child. This is a 5 week course running from Thursday 22 February 2024 10am -11.30am until Thursday 21 March, with the final session being an extended session narrative therapy session facilitated by Riverbank Psychology. There will be the opportunity to join a follow up support group. Week 1 – Thursday 22 February 2024 10am Welcome and overview of support available from the Huntington Disease Association. Speaker: James O’Connor – Team Leader HDYES – Huntington’s Disease Association Week 2 – Thursday 29 February 2024 10am Genetics: How to access testing, the process and family planning options Speaker: Chris Platt – SHDA – Huntington’s Disease Association Week 3 – Thursday 7 March 2024 10am Research update and what next Speaker: Nataile Saad - Research Sister - Welcome Trust Southampton University Hospital Week 4 – Thursday 14 March 2024 10am Finances planning ahead Speaker: Lisa Pearson - Financial Advisor - Asset management Week 5 – Thursday 21 March 2024 9.30 -12.30pm (note longer session)* Narrative Therapy: Coping with Feelings, supporting a loved one and self-care. Mariangels Ferrer – Clinical Psychologist – Riverbank Psychology * We will invite previous course participants to this part of the course but can only accommodate a maximum of 12/14 people on the day. The focus of Narrative Therapy in this group is to participate in a creative activity that explores identity through values, beliefs, and support systems, enabling us to make connections to our external lives which will be sustainable in our everyday lives. Mariangels Ferrer Duch is a Clinical Psychologist trained in Narrative Therapy who will be facilitating a three-hour Narrative Therapy session. The focus of the session will be upon the many small things that are important to us in life which can often be overlooked in times of stress. We hope the conversation will help to mutually inspire us all! We take your privacy seriously and promise to never sell your data. You can find out more about your rights, how we use your personal information and how we keep your details safe and secure by reading our privacy policy here. For more information email info@hda.org.uk or call 0151 331 5444.
Keeping Yourself in Mind: An ACT-informed programme for people supporting a family member with JHD We are pleased to invite you to our virtual course for parents and family carers of people living with Juvenile Huntington’s disease. The course will be run by Sarah Gunn, a clinical psychologist and researcher at the University of Leicester, and will be based on the principles of Acceptance and Commitment Therapy. Acceptance and Commitment Therapy is a therapeutic approach which focuses on learning to manage difficult thoughts and feelings, and to live a life which feels valuable and meaningful despite the struggles we encounter. This is an opportunity to explore the difficulties that can be associated with caring for a person with JHD (for you and within the family), to identify the values that matter most to you, and for you to think about how to move towards a more rich and valued life than you may have now. This is an eight-week course running from Wednesday 7 February to Wednesday 27 March 2024. The sessions will be on a Wednesday afternoon 1-2.30pm. Here is a very brief session outline: Week 1: Introductions: To ACT, to the programme, and to each other Week 2: Impacts of Juvenile Huntington’s on the “carer”* and wider family Week 3: Psychological wellbeing when supporting a person with Juvenile Huntington’s Week 4: Coping and adjustment: Living with, not battling against Week 5: What matters to you: Finding your values Week 6: Moving forward: Taking steps to align with your values Week 7: Living a valued life alongside Huntington’s: Plans and coping strategies Week 8: Reflection and ending: What’s next? *Note: Some people don’t like this term, so here we’re using it in quote marks. During the course, we will discuss which term would be preferred by the people attending. For more information on what information we collect and how we use it when booking onto one of our events, please see our privacy policy on our website.
Duration 2 Days 12 CPD hours This course is intended for Die Schulung ist zugeschnitten auf die Bedarfe von: Entwickler:innen, Menschen, die die Rollen Scrum Master oder Product Owner ausüben. Projekt- und Prozessexpertinnen und -experten. Manager:innen sowie Teams, die Kanban für das Managen von täglichen operativen Aktivitäten einsetzen, z. B. Mitglieder von DevOps-Teams. Fachleute aus Bereichen wie z. B. Personal, Finanzen, Marketing, Produktion und Support. Alle, die irgendwo den Arbeitsfluss optimieren möchten. Overview Kanban umfasst sechs Grundpraktiken: Arbeitsfluss visualisieren Work-in-Progress (WIP) begrenzen Arbeitsfluss kontrollieren Prozessregeln explizit machen Feedback-Schleifen implementieren Gemeinsam verbessern, experimentell weiterentwickeln Im Mittelpunkt der Schulung steht das Verständnis der Kanban-Prinzipien und wie man diese mit Hilfe der Kanban-Werkzeuge (Tools) in der Praxis anwendet. Der Kurs bereitet auf die entsprechende Zertifizierung EXIN Kanban Foundation vor. Kanban: Methode zur kontinuierlichen Verbesserung des Arbeitsflusses in kollaborativen Teams. Zentrales Mittel ist die Visualisierung und Begrenzung der parallel in Arbeit befindlichen Aufgaben. Einsatzgebiete: SW-Entwicklung, IT-Betrieb, Produktion. Vorteile von Kanban 1.1 Die Flexibilitât von Kanban 1.2 Die Kanban-Kultur Kontinuierliche Verbesserung 2.1 Kaizen einfÂhren 2.2 Prozesse visualisieren und verbessern 2.3 Rahmenbedingungen fÂr Verânderungen Kanban implementieren 3.1 Arbeit visualisieren 3.2 Tickets erstellen 3.3 Work-in-Progress (WIP) begrenzen 3.4 Fluss und Lieferrhythmus kontrollieren 3.5 Priorisierung 3.6 Variabilitât reduzieren Kanban skalieren 4.1 Kanban mit verteilten Teams 4.2 Kanban in Groáprojekten
Duration 5 Days 30 CPD hours This course is intended for DevelopersConsultants Overview Explore SAP Gateway architecture and deployment optionsPerform OData queries and operations with SAP GatewayDefine data model and implement CRUD operationsExtend SAP Gateway services and build new ones with CDS ViewsConfigure routing, multiple origin, and SAP Workflow supportImplement advanced OData operations and introduce OData V4Handle security and consume OData services using SAP Web IDE Students will explore SAP Gateway architecture and deployment options. SAP Gateway Overview SAP Gateway Architecture SAP Gateway Deployment Options OData Overview OData and REST OData Operations OData Queries Consuming OData using SAP Web IDE SAP Gateway Service Implementation Defining a Data Model Implementing Read Operations Implementing Navigation Implementing Query Options Implementing Change Operations SAP Gateway Service Generation RFC/BOR Generator Search Help Generator SAP Gateway Service Redefinition Redefining a Data Service Redefining a Gateway Service SAP Gateway and CDS Views SAP Fiori Programming Model CDS/SADL Generator Data Source Reference CDS View Annotations SAP Gateway Hub Functionalities Multiple Back-End Systems Support Configuring Routing Capabilities Multiple Origin Composition SAP Workflow Support Advanced OData Options Implementing Function Imports Implementing Expand Operations Implementing Deep Insert Operations Handling ETags Batch Requests Media Links Offline Support Server Side Caching SAP Gateway Security Authentication Data Security SAP Gateway OData V4 Support OData V4 Implementation OData V4 Publishing
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
This accredited qualification has been designed for delivery to all learners working or preparing to work in a customer service role or where using the telephone is a part of their role. This qualification covers the principles of customer service, including how to meet customer expectations, the importance of appropriate behaviour and communication techniques, as well as ways to deal with problem customers. How long will it take me to achieve this qualification? This qualification is classroom-based and usually achieved by taking a one-day course. However, it can also be achieved through a variety of other methods including blended and distance learning, as long as the recommended learning hours are completed. How is the qualification assessed? Through a 1-hour 30-question multiple-choice examination. Learners must achieve a score of at least 20 out of 30 in order to pass.