Duration 0.75 Days 4.5 CPD hours This course is intended for Making Microsoft Word documents accessible. Overview Please refer to Overview. During this course students will interact with a variety of Word documents and review components that would render the document inaccessible. Students will enable the Accessibility Checker and the Speak feature and progress through the processes and procedures to meet the AODA mandate. Students will ultimately create an accessible set of styles and use those styles within the document. Adding the Accessibility Checker and the Speak feature Discussions will follow as to the limitations of the checker When the checker won?t run Document Metadata Students will review where and why to add metadata to a Word Document Setting the application language and setting the document language Setting the document title Adding the Author and subject metadata fields Creating Accessible Paragraphs and Columns Students will see the perils of incorrect use of hard returns and text boxes within a document Exercises will have students work with paragraph formatting and column formatting for accessibility Creating Accessible Tables Students will interact with tables that are poorly designed and restricted them to still maintain content but that are now accessible Discussions will surround, changes to how tables are handled when sending to PDF Accessible Imagery Students will discuss the need to images with a document The Alternate text feature will be used and the rationale for adding specific types of descriptions Students will see and understand the rationale for ?in-line- imagery Styles for Navigation Students will use and modify the built-in styles feature of Microsoft Word and create a table of contents Students will see with the use of the navigation pane, how styles impact accessibility Students will also understand the importance of proper styles nesting Headers, Footers and Footnotes Students will discuss and then implement accessible headers and footers Students will discuss footnotes and alternative methods to provide footnotes Verifying Reading Order Students will ?listen? to their documents using the Speak feature Students will enable the selection pane as an accessibility tools and discuss its limitations Creating an Accessible Style Template Students will create several accessible styles including headings and paragraphs Students will save the style within a template Additional course details: Nexus Humans Accessible Documents training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Accessible Documents course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Submit tax returns and self-assessments like a pro as we simplify the jargon and provide essential information on all things HMRC Navigating Tax and Self-Assessment Join us for an online event where we'll demystify the world of taxes and self-assessment. Whether you're a freelancer, small business owner, or just curious about managing your finances as a start-up, this event is for you! Our Chartered Certified Accountant, Mandeep Ubhi, is an expert in his field and will break down complex tax jargon into easy-to-understand language, giving you the confidence to tackle your tax obligations; from understanding tax allowances to filing your self-assessment, we've got you covered. Take advantage of this opportunity to gain valuable insights and tips to easily navigate the tax landscape!
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
An interactive workshop with Karen Hale. Learn how to gain the confidence, skills and techniques to speak up so you can be heard. "There are two types of speakers: Those who get nervous and those who are liars." - Mark Twain Is this you? Promotions not applied for, jobs roles not tried for, networking events not attended? Parties avoided, family ceremonies not spoken at, too much left unsaid? Do you have excellent ideas that get lost in time because you are fearful of voicing them. Have you missed opportunities because it involves showing up? Do you stay silent in meetings? Do you have a brilliant business idea that isn’t being pursued because you know it will involve some kind of networking or public speaking? If the answer to any/most of these is YES, then read on... This workshop is strange by its nature. Why would someone who disliked public speaking, go to a place where they would speak in public? This is why.... Because Karen has analysed what makes a good communicator when speaking informally to people; she has taken those aspects and developed a group of exercises that allows you to use these exact techniques when speaking at networking events and in public. Added to that, Karen provides a smorgasbord of methods on how to control nerves to ensure you communicate at your authentic best. Please note: everybody in the room will be there for the same reason as you! You will be supported and encouraged and will learn how to turn fear into empowerment! About Karen: An empowerment and public speaking coach with over 30 years experience in coaching and advising individuals and business leaders from a diverse range of sectors on effective communication skills. It takes a second to form a first impression about a person. Your body language, clothes, speech and personal presence convey messages about your background, skills and expertise. Karen works with her clients to ensure they make that first impression powerful and authentic so they get remembered for the right reasons. By creating a confident and authentic presence you increase your visibility and your credibility. “Karen is a truly special individual. She made me feel totally at ease and was able to help me stand and speak confidently for the first time and she did that all with huge warmth and a lot of humour.” She fulfils her greatest passion on a daily basis, helping people present themselves to the outside world in the very best way. She has enabled hundreds of people to move on in their life and careers and build their growth, confidence and image. Karen works across a huge spectrum - from CEOs in FTSE 100 companies to Foundation Class university students at UAL coaching presentation skills. She coaches senior individuals and consults to leading global banks, private banks and family offices, advising business leaders and their teams. She is Central School of Speech and Drama trained. Kind words about Karen... I have had the absolute pleasure of working with Karen numerous times over the past 16 years to assist me in my various corporate roles. Karen has always been the person I have turned to first and foremost when I have needed help with my personal brand, presence and communication, helping me develop confidence in public speaking and showing up in front of the camera. A HUGE thank you for Monday – you were wonderful. The feedback we have had has been unbelievable – I can honestly say in all my years in this industry I have never heard such positive comments on every aspect. Karen has an incredible gift of making you feel completely at ease and is able to bring the best out of a person with ease. She is friendly, approachable and warm and I now refer Karen to everybody I know who needs assistance with any type of public speaking, communication and confidence requirement. The results speak for themselves. Highly recommend! You can contact Karen at: https://www.linkedin.com/in/karen-hale-8925862b/ / 07956626740 For any questions regarding this event, please contact the organiser lara@themotivationclinic.co.uk / 07817247727 - thank you!
Functional skills English Certification Course Overview The Functional Skills English Certification course is designed to enhance learners' command of English by improving key language skills essential for everyday communication and professional environments. It covers the fundamentals of grammar, sentence structure, punctuation, spelling, and common language errors, providing a well-rounded foundation in English. Learners will gain confidence in their reading, writing, and verbal communication, equipping them for a variety of roles in the workplace or further education. This certification is ideal for those looking to improve their English proficiency and meet the language standards required in various professional and academic settings. Course Description This course offers an in-depth exploration of the core components of English, starting with grammar and sentence structure. Learners will develop a strong understanding of punctuation, capitalisation, and spelling to enhance their writing accuracy and clarity. The course also addresses common language mistakes and offers strategies for improvement. Throughout the course, learners will engage with interactive content, building their knowledge and applying it to real-world scenarios. By the end, students will have gained the necessary skills to communicate effectively in both written and spoken English, empowering them to succeed in academic, professional, and social settings. Functional skills English Certification Curriculum Module 01: Introduction to the Course Module 02: The Basics of Grammar Module 03: The Basics of Sentence Module 04: Structure of Sentence Module 05: Question Module 06: Punctuation & Capitalisation Module 07: Spelling Module 08: Common Mistakes & Ways to Improve (See full curriculum) Who is this course for? Individuals seeking to improve their English language proficiency Professionals aiming to enhance their communication skills Beginners with an interest in mastering the English language Those preparing for English exams or certifications Career Path Administrative Assistant Customer Service Representative Teacher or Tutor Content Writer Communication Specialist Copywriter Public Relations Officer
Update and renewal option for Geopace Training Certificate holders Update and renew your existing certificate ... Recommended certificate renewal after 18 months Nationally Recognised Dual Accreditations Open College Network Accredited (Advanced Level) CPD Accredited (The CPD Certification Service) Recaps phlebotomy theory incl. legislation Updates your certification and compliancy Awards cumulative credits and CPD points awarded Basic understanding of English language required Download a certificate on completion of your online course APPLICANTS ARE REQUIRED TO HAVE COMPLETED AN ACCREDITED INTRODUCTION TO PHLEBOTOMY COURSE
Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring
Duration 5 Days 30 CPD hours This course is intended for This basic course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of Java and object-oriented programming concepts. Attendees might include: Technically-minded attendees who want or who want to begin the process of becoming an OO application developer Technical team members from non-development roles, re-skilling to move into software and application development roles within an organization Recent college graduates looking to apply their college experience to programming skills in a professional environment, or perhaps needing to learn the best practices and standards for programming within their new organization Technical managers tasked with overseeing programming teams, or development projects, where basic coding knowledge and exposure will be useful in project oversight or communications needs Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with Java, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: The steps involved in the creation and deployment of a computer program What OO programming is and what the advantages of OO are in today's world To work with objects, classes, and OO implementations The basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction The basic constructs that all programming languages share The basic Java constructs supporting processing as well as the OO orientation How to use Java exception handling About and how to use classes, inheritance and polymorphism About use collections, generics, autoboxing, and enumerations How to take advantage of the Java tooling that is available with the programming environment being used in the class Getting Started with Programming, OO and Java Basics for Non-Developers is a skills-focused, hands-on coding course that teaches students the fundamentals of programming object oriented (OO) applications with Java to a basic level, using sound coding skills and best practices for OO development. This course is presented in a way that enables interested students to embrace the fundamentals of coding as well as an introduction to Java, in a gentle paced environment that focuses on coding basics.Students are introduced to the application development cycle, structure of programs, and specific language syntax. The course introduces important algorithmic constructs, string and character manipulation, dynamic memory allocation, standard I/O, and fundamental object-oriented programming concepts. The course explains the use of inheritance and polymorphism early on so the students can practice extensively in the hands-on labs. Structured programming techniques and error handling are emphasized. The course includes the processing of command line arguments and environment variables, so students will be able to write flexible, user-friendly programs. Students will leave this course armed with the required skills to begin their journey as a Java programmer using modern coding skills and technologies. Introduction to Computer Programming Introduction to Programming Programming Tools Programming Fundamentals Thinking About Objects Program Basics Programming Constructs Java: A First Look The Java Platform Using the JDK The Eclipse Paradigm Writing a Simple Class OO Concepts Object-Oriented Programming Inheritance, Abstraction, and Polymorphism Getting Started with Java Adding Methods to the Class Language Statements Using Strings Specializing in a Subclass Essential Java Programming Fields and Variables Using Arrays Java Packages and Visibility Advanced Java Programming Inheritance and Polymorphism Interfaces and Abstract Classes Exceptions Java Developer's Toolbox Utility Classes Enumerations and Static Imports Formatting Strings Collections and Generics Introduction to Generics Collections
Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview This Workplace Communication Management course provides a well-rounded understanding of how communication functions within professional environments, equipping learners with the ability to navigate various workplace dynamics with clarity and confidence. From understanding the importance of stakeholder communication to overcoming barriers and developing interpersonal skills, this course is designed to enhance effectiveness across all levels of an organisation. Learners will explore the role of cultural influences, language use, and internal communication structures that impact workplace productivity and cohesion. By the end of the course, individuals will be equipped to handle communication responsibilities more effectively, contribute to a healthier work culture, and support organisational goals through better message delivery and reception. Whether working independently or as part of a team, learners will find the content applicable across a range of industries and roles, providing long-term benefits in managing workplace interactions and aligning communication with broader business objectives. Course Description This comprehensive course delves into the theory and application of workplace communication, with a focus on developing clear, consistent, and context-appropriate messaging. Learners will begin by examining the importance of internal communication and its influence on stakeholders. The course addresses barriers such as misinterpretation, cultural misunderstandings, and language inefficiencies, offering strategies to overcome them. Modules also cover the impact of organisational culture on communication, the use of professional language, and maintaining effective interpersonal relationships. Designed for those who wish to strengthen their communication capabilities in a structured environment, the course encourages reflective learning and the application of communication principles across varied workplace scenarios. Emphasis is placed on building mutual understanding and aligning communication efforts with organisational aims. Upon completion, learners will be able to foster clearer communication lines, improve workplace engagement, and manage communication challenges with increased confidence and awareness. Course Modules: Module 01: Information and Communication for Stakeholders Module 02: Communication & Barriers Module 03: Culture and Communication in the Workplace Module 04: Language and Effective Communication Module 05: Business Communication & Interpersonal Relationships Module 06: Communication Improvement at Workplace (See full curriculum) Who is this course for? Individuals seeking to build strong workplace communication skills. Professionals aiming to improve organisational communication and team engagement. Beginners with an interest in corporate communication and business relations. HR personnel, managers, and team leaders looking to foster better communication culture. Career Path Communication Officer Team Leader or Supervisor Human Resources Assistant Office Administrator Business Development Coordinator Internal Communications Specialist Customer Relationship Manager