Proofreading & Copyediting Level 5 Course Overview This Proofreading & Copyediting Level 5 course offers an in-depth understanding of the essential skills required for proofreading and copyediting. Learners will explore key techniques for enhancing text accuracy, consistency, and clarity. Through detailed lessons, this course covers proofreading basics, the application of style guides, grammatical rules, and the intricacies of copyediting. Learners will also gain knowledge in legal checks and how to develop a successful career in this field. By the end of the course, participants will have a solid foundation in proofreading and editing, enabling them to produce high-quality written content that meets industry standards. Course Description This comprehensive course dives into the world of proofreading and copyediting, focusing on fundamental skills and advanced techniques. Learners will examine key concepts like applying style guides, understanding grammar rules, and maintaining text accuracy. Modules cover proofreading both on paper and on-screen, copyediting for language use, accuracy, and legal checks. A significant part of the course involves developing an understanding of professional editing practices, which will enable learners to work in various industries such as publishing, marketing, and legal sectors. The course structure is designed to offer a gradual progression, helping learners to refine their skills and gain confidence in producing error-free and well-polished content. Proofreading & Copyediting Level 5 Curriculum Module 01: Proofreading Basics Module 02: Applying the Style Guide Module 03: Spelling and Grammar Module 04: Proofreading on Paper Module 05: Proofreading On-Screen Module 06: Copy-Editing Basics Module 07: Copy-Editing – The Use of Language Module 08: Copy-Editing – Checking Accuracy and Facts Module 09: Copy-Editing – The Beginning and The End Module 10: Copy-Editing – Legal Checks Module 11: Finding Work and Developing Your Career (See full curriculum) Who is this course for? Individuals seeking to improve their proofreading and editing skills. Professionals aiming to advance in editing and publishing careers. Beginners with an interest in editing and writing industries. Anyone seeking to refine their written communication. Career Path Proofreader Copyeditor Content Editor Publishing Assistant Editorial Assistant Freelance Proofreader/Copyeditor Legal Proofreader Publishing Manager
Customers are astute and well-practised in researching and seeking information, solutions and added value in the minimum number of clicks online. There's only so much time they're willing to spend carrying on clicking. This mentality isn't just restricted to the world of B2C. In our increasingly hectic world, where information is expected to be available instantly, it applies just as much to B2B. In this workshop, we look at how putting yourself in the shoes of your customer and mapping their decision-making and buying journey is critical to ensuring that you provide what they perceive as fast solutions and added value. You will learn all about the three pillars for creating competitive brand experiences: Customer engagement planning puts you firmly in the shoes of your customer, helping you to build meaningful marketing communications delivered through the right resources at the right time to inspire your customers to engage with you. This programme will help participants to: Understand the evolution of the customer buying journey Map a customer buying journey for your brand or solutions Understand the customer micro-moments and signals indicating interest and buying intent, both online and offline Apply the psychology of branding to build marketing communications with impact Develop sales and marketing content that differentiates your brand(s) from the competition by demonstrating unique value and how you can meet your customer's needs 1 The evolution of the customer journey Understand how the use of mobile has had an impact on the customer buying journey where today's customers can research and compare products and solutions whenever and wherever they like, making the purchase journey even less linear Explore how marketers are adapting to this new customer behaviour and drawing upon various strategies to win the hearts and minds of their audiences 2 The See-Think-Do-Care framework Explore the many different frameworks used to track the customer journey Understand and apply the modern marketing model, where the internet has enabled the customer to hop between multiple touchpoints before making a purchase decision 3 Customer micro-moments and signals in their buying journey Understand the online and offline moments when customers seek information to research and make buying decisions Apply this understanding to build a marketing communication plan to reach customers at all stages of their buying journey 4 The role of branding in the customer journey Explore the psychology of branding Learn how to ensure your branding is relevant to your target customer needs Bring together your brand value and story to achieve brand loyalty 5 The Why-How-What framework Apply a systematic approach to build a successful and compelling brand Understand how starting with 'why' will help build your brand purpose Apply the content marketing matrix to communicate your brand's value Apply the hero-help-hub model to build engaging content marketing Actionable outcomes We will use your brand examples to provide opportunities for practice: You will learn and reflect on best practice examples of customer engagement You will discover your brand value, purpose and the 'sweet spot' to drive engagement with your customers You will create a customer engagement plan that can be implemented immediately within your business You will receive immediate feedback on your customer engagement plan You will have the opportunity to share common issues and solutions with your colleagues in the group
Duration 3 Days 18 CPD hours This course is intended for This course is designed for any individual who might need to perform project management activities in their job role on either a formal or informal basis, or any individual who wants to build upon their current project management knowledge to be more productively involved on a project team. This course is not specifically designed for students who are seeking project management-related certification. Rather, it is designed to introduce a structure to help students more effectively manage projects as well as participate fully on a project team. Overview In this course, you will apply recognized practices of project management to manage a project from start to finish. You will: - Identify the basic concepts of project management. - Launch a project. - Estimate project work. - Create a project schedule. - Plan project costs. - Plan for project risks. - Plan for project quality and compliance. - Manage human and physical resources for the project. - Manage project procurements. - Plan for change management and monitor the project scope. - Monitor and optimize project schedule and cost. - Monitor the quality of the project work and the risks involved. - Plan communication strategies and manage stakeholder relationships. - Close a project. If you are taking this course, you probably have some exposure to managing projects, or you may be considering embarking on a career as a professional project manager. Your ability as a project manager to demonstrate best practices in project management on the job is becoming the standard to compete in today's fast-paced and highly technical workplace. In this course, you will apply the generally recognized practices of project management to successfully manage projects. Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the skills needed to be a successful project manager in today's rapidly changing world. The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge in the project management profession. Getting Started with Project Management Define Project Management Basics Identify Influencing Factors Define Project Management Certifications Launching Projects How Organizations Choose the Right Project Identify Project Stakeholders and Their Expectations Authorize a Project Identify the Project Scope Estimating Project Work Develop a WBS Identify the Relationships Between Work Packages Identify Resources Estimate Time Creating a Project Schedule Develop a Project Schedule Create a Schedule Baseline Planning Project Costs Establish Project Costs Establish the Cost Baseline Reconcile Funding and Costs Planning for Risk Create a Risk Management Plan Identify Risks and Their Causes Analyze Risks Develop a Risk Response Plan Planning for Quality and Compliance Deliver the Desired Project Results Verify Compliance Requirements Managing the Project Team Plan Your Project Team Assemble the Team Develop the Team Manage the Team Managing Project Procurements Plan for Project Procurements Obtain Responses from Vendors Select the Right Vendor Manage Vendors and Procurements Managing Change During Project Execution Prepare for Project Execution Manage Project Changes Monitor the Project Scope Monitoring and Controlling Project Schedule and Cost Monitor and Control the Project Schedule Optimize the Project Schedule Monitor and Control Project Cost Monitoring and Controlling Risk and Quality Monitor and Control Risks Put Quality Plans into Action Control Project Quality Communicating and Reporting Communicate During a Project Distribute Project Information Manage Stakeholder Relationships and Expectations Report on Project Performance Closing the Project Deliver the Final Product Close Project Procurements Close the Project
Duration 2 Days 12 CPD hours Overview Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment's app and desktop workloads. You will learn how to plan, build, rollout, and manage on-premises WEM or WEM service and how to integrate it into Citrix Virtual Apps and Desktops or Citrix DaaS. You will leave this course with a good understanding of how to manage additional solutions and features in your Citrix Virtual Apps and Desktop or Citrix DaaS site Module 1: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 2: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 3: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 4: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 5: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 6: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 7: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 8: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 9: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 10: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 11: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 12: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-220 Citrix Workspace Environment Management Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-220 Citrix Workspace Environment Management Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring
Most organisations and businesses are trying to navigate the best way back to a functional working framework. But two things need to happen - 1. The working practices need to be efficient, sustainable and compatible for meeting the demands and needs of the organisation; it’s clients, it’s workforce and it’s Leaders 2. The culture needs to be welcoming, authentic and supportive otherwise there will be disenfranchisement and potentially a churn of staff and loss of talent What has been proven to be a very successful approach to mitigate the dangers of demotivated team members and poor efficiency levels is a bespoke ‘Ushering the Team Back to the Workplace’ workshop. Programme Outline Below is a template of an actual Programme that has been delivered very successfully for clients such as the NHS; Claranet; Jotun Paints & Workspace. This, however, can be modified to suit any group or size. It will be designed to reflect the Organisation’s preferred Hybrid working framework and communication systems. The options of having the innovative Real Play technique to help handle delicate conversations is especially effective. The biggest gain is to reconnect the relationships via the activities and exercises, which would be selected carefully. Key commitments and buy-in is always the priority outcomes - which this programme will help deliver in just 1 day. The objectives include: Making the transition back to working as a collaborative team Enhancing the Leadership skills of the team Reviewing/establishing the Hybrid working protocols Galvanising the Team spirit Maintain inclusivity among full-time; part-time and Region based team members Energising and motivational Fun! Exercise – Round the Bend The team are to follow the instructions delivered as they walk (and jump) through the route – always keeping a safe distance apart. The instructions become more complicated as they progress. Debriefing points: Dealing with Change Attention to Detail Adapting approach Optimising results Exercise - Number Crunch (3 x Cohorts of 12/13) The team must be effectively led and motivated to work as one unified group to reach their objective of visiting each numbered location within a very tight deadline. Debriefing points: Support and co-ordination Strategy and planning Adapting approach Optimising results Tutorial – Team Dynamics Tuckman model Phases of Development towards Maturity Exercise - Juggling (3 x Cohorts of 12/13) The group(s) will be invited to optimise the number of ‘clients’ (juggling balls) they can manage at one time. This involves devising a sequence between the group to achieve maximum results without making any mistakes. We introduce different balls which represent different degrees of complexity, challenging the group’s preparation and approach to a variety ‘customers’ needs. Debriefing points: Ensuring effective communication Clarifying the approach for dealing with the unexpected Setting expectations and reviewing delivery Treating every colleague with care and respect Tutorial - Email Etiquette The primary standards – best practices ABSURD model Preparation and planning Top Tips World Cafe The team are split into 5-6 sub-groups – each with a specific review focus:- What recommendations do you have to engage the team back into the Workplace? How do we ensure the framework is efficient? What are the best ways to optimise team working strategically when most/all team members are in the office? What potential barriers are there? How do we accommodate for the Regional team members? What are the benefits to bringing the team back to the workplace? Each session has 2 – 3 rounds with each table’s ‘host’ sharing feedback for applying to the Team Action Plan – or Charter. Debriefing points: Each Syndicate’s recommendations and capture the key actions they generate 'Real Play' We offer an innovative solution to bring real Leadership/team scenarios to life. We use actors who improvise scenarios which have been specified by the group. The group is split the group into 2 sub-groups, one with the Actor, the other with the Trainer. Each group has a brief and has to instruct their Trainer/Actor on how to approach the scenario supplied. The Actor and Trainer perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers Assign 24 x ‘Directors’ (4 for each Player – Phil & Julia – for each Real Play. Potential Real Play Scenarios: Engaging with a team member as to how the new working plans will be applied. Overcoming concerns to the new working practices/framework Addressing issues where a team member feels excluded from the teamworking practices/culture Debrief the Programme Individual Action Plans Team Priorities for application into the workplace
Duration 3 Days 18 CPD hours Overview In this course you?ll learn how to: Containerize and deploy a new Python script Configure the deployment with ConfigMaps, Secrets and SecurityContexts Understand multi-container pod design Configure probes for pod health Update and roll back an application Implement services and NetworkPolicies Use PersistentVolumeClaims for state persistence And more In this vendor agnostic course, you will use Python to build, monitor and troubleshoot scalable applications in Kubernetes. Introduction Objectives Who You Are The Linux Foundation Linux Foundation Training Preparing Your System Course Registration Labs Kubernetes Architecture What Is Kubernetes? Components of Kubernetes Challenges The Borg Heritage Kubernetes Architecture Terminology Master Node Minion (Worker) Nodes Pods Services Controllers Single IP per Pod Networking Setup CNI Network Configuration File Pod-to-Pod Communication Cloud Native Computing Foundation Resource Recommendations Labs Build Container Options Containerizing an Application Hosting a Local Repository Creating a Deployment Running Commands in a Container Multi-Container Pod readinessProbe livenessProbe Testing Labs Design Traditional Applications: Considerations Decoupled Resources Transience Flexible Framework Managing Resource Usage Multi-Container Pods Sidecar Container Adapter Container Ambassador Points to Ponder Labs Deployment Configuration Volumes Overview Introducing Volumes Volume Spec Volume Types Shared Volume Example Persistent Volumes and Claims Persistent Volume Persistent Volume Claim Dynamic Provisioning Secrets Using Secrets via Environment Variables Mounting Secrets as Volumes Portable Data with ConfigMaps Using ConfigMaps Deployment Configuration Status Scaling and Rolling Updates Deployment Rollbacks Jobs Labs Security Security Overview Accessing the API Authentication Authorization ABAC RBAC RBAC Process Overview Admission Controller Security Contexts Pod Security Policies Network Security Policies Network Security Policy Example Default Policy Example Labs Exposing Applications Service Types Services Diagram Service Update Pattern Accessing an Application with a Service Service without a Selector ClusterIP NodePort LoadBalancer ExternalName Ingress Resource Ingress Controller Labs Troubleshooting Troubleshotting Overview Basic Troubleshooting Steps Ongoing (Constant) Change Basic Troubleshooting Flow: Pods Basic Troubleshooting Flow: Node and Security Basic Troubleshooting Flow: Agents Monitoring Logging Tools Monitoring Applications System and Agent Logs Conformance Testing More Resource Labs Additional course details: Nexus Humans Kubernetes for App Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Kubernetes for App Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Write to Impress: Creative Writing Course Overview This comprehensive course on creative writing is designed to unlock your storytelling potential and refine your writing skills across multiple genres. Learners will explore the foundations of creative writing, from constructing compelling narratives to developing vivid characters and authentic dialogue. The course also delves into specialised areas such as poetry, thriller writing, and business communication, offering a broad and versatile skill set. By the end of the course, participants will be equipped with the ability to craft engaging fiction and non-fiction pieces, prepare polished proposals, and confidently approach the publishing process. Ideal for aspiring writers, professionals seeking to enhance their writing abilities, and those passionate about storytelling, this course emphasises clarity, creativity, and critical thinking, enabling learners to write with confidence and impact. Course Description This course covers a wide range of creative writing topics to provide a thorough understanding of narrative techniques and writing styles. Starting with the history and evolution of creative writing, learners will progress through novel writing, non-fiction, and the art of character creation. Emphasis is placed on writing believable dialogue and exploring genre-specific approaches such as horror and children’s literature. Additional modules address poetry, proposal development, and the importance of critical thinking in writing. The course also includes business writing essentials and guidance on editing, evaluating work, and navigating the publishing industry. Throughout the learning journey, students will enhance their analytical skills and learn to express ideas clearly and persuasively. The structured curriculum is ideal for anyone wishing to broaden their writing expertise in a supportive and well-rounded learning environment. Write to Impress: Creative Writing Curriculum: Module 01: Introduction to Creative Writing Module 02: The Development of Creative Writing Module 03: Novel Writing Module 04: Writing Non-Fiction Module 05: Creating Fictional Characters Module 06: Writing Realistic Dialogue Module 07: Writing Horrors, Thriller and Murder Stories Module 08: Writing for Children Module 09: Writing Poetry Module 10: Proposal Writing Module 11: Critical Thinking Module 12: Business Writing Module 13: Other Writings Module 14: Editing, Evaluating and Getting Published (See full curriculum) Who is this course for? Individuals seeking to develop creative writing skills. Professionals aiming to improve their writing for career advancement. Beginners with an interest in storytelling and literary arts. Writers looking to explore various writing styles and genres. Career Path Author or Novelist Content Writer or Copywriter Editor or Publisher Scriptwriter or Screenwriter Communications Specialist Marketing and Proposal Writer