Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.
Successful communications are all about making the message as simple as possible – but this can be difficult when the subjects we're talking about are inherently complicated. Academic institutions, tech companies, health organisations, charities and many others have complex ideas, processes and systems at the heart of what they do. This course is for anybody who needs to distill information down into key messages for important stakeholders, funders and investors, decision makers and members of the public. You’ll learn proven techniques for grabbing attention and changing minds through presentations and public speaking, infographics and data visualisations, and written reports and online posts. We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve. Sample learning content Session 1: Understanding your audience Matching your objectives to your audience's motivations. Identifying the right tone and language. Understanding how, where and when your audience wants to be spoken to. Session 2: Refining your objectives Breaking down strategic aims into tactical steps Metrics and milestones: defining and measuring progress and success. Rapidly building a brief for your communications. Session 3: Telling the story Using metaphors, visuals, comparisons to frame your narrative. From slide decks to online campaigns - choosing the right formats for delivering your message. Selecting communications channels to maximise reach and impact. Session 4: Keeping it going Processes and systems for launching and maintaining communications campaigns. Building social proof – creating and curating content. Troubleshooting and preparing for common challenges. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “We’ve now worked with Alan for almost 3 years, and during that time he has continued to deliver the highest quality training for our clients and delegates. Alan’s passionate delivery style has continued to deliver innovative training solutions to over 1500 delegates across the public, private and voluntary sector. Each of our courses with him has always delivered exceptional feedback and satisfaction levels.” Joe Barlow | Head of Programme, Understanding ModernGov
To drive actions and get decisions made, you need to be able to present effectively to customers, clients, senior managers or colleagues. The perfect presentation is a potent combination of content, design and delivery You need to distill down complex concepts, large data sets, intricate processes and innovative ideas. You need to make the right design choices to ensure your slide decks communicate quickly (as well as looking great). And you need the confidence and storytelling techniques to lead your audience through the content. This course is for anyone who regularly needs to create and deliver presentations for different stakeholders. It will cover how to plan, design and deliver brilliant presentations. Sample learning content Session 1: Planning a presentation Assessing the needs and level of understanding of your audience. Frameworks for building a logical and compelling narrative. Emphasising key messages, while allowing for deep dives and questions. Session 2: Presenting data and processes Understand graphical perception and how people absorb visual information. Effective charts for different types of data stories. How to display processes, timelines and organisational structures. Session 3: Design tricks Using colours to add emphasis and meaning. Creating hierarchies of information to help your audience. Building templates and style guides. Session 4: Delivery techniques Perfecting your performance in-person or online. Dealing with difficult questions and hostile audiences. Refining the beginning, middle and end of your narrative. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial "We’ve now worked with Alan for almost 3 years, and during that time he has continued to deliver the highest quality training for our clients and delegates. Alan’s passionate delivery style has continued to deliver innovative training solutions to over 1500 delegates across the public, private and voluntary sector. Each of our courses with him has always delivered exceptional feedback and satisfaction levels." Joe Barlow | Head of Programme, Understanding ModernGov
Course Title: 3ds Max Night Training Program. Join our 3ds Max Evening Course for after-work convenience and guidance in 3D modeling. Personalized attention, and build an impressive portfolio. 3ds Max Courses & Classes Online and in-person in London. Click here for more info: Website Training Duration: 10 hours Learning Approach: 1-on-1 sessions and Customized content. Course Schedule: Reserve a convenient hour from 9 am to 7 pm, Monday to Saturday, to suit your schedule. I. Introduction to 3ds Max Course Overview Familiarization with the User Interface Basic Navigation and Settings II. Creating 3D Objects Formation of Primitive Objects Crafting Complex Shapes using Editable Poly Application of Modifiers to Objects Implementing Materials and Textures III. Lighting Introducing Light Sources in a Scene Different Types of Lighting Adjustment of Light Properties Creating Shadows IV. Camera Establishing Cameras and Camera Views Fine-Tuning Camera Settings Camera Animation Techniques V. Animation Fundamentals Keyframe Animation Techniques Utilizing the Time Slider and Track View Animation of Object Transformations Animated Materials and Textures VI. Rendering Configuration of Render Settings Selection of Output Format Batch Rendering Procedures Post-Processing Effects VII. Project-Based Learning Application of Learned Techniques in a Final Project Creative Problem-Solving for Project Completion In-Depth Course Outline: Modeling Techniques Edit Poly Modeling Extrusion, Chamfer, Cut, and Slicing Techniques Symmetry Mirror Modeling Designing Furniture (Tables and Chairs) Basic House Model Design Creating Lines and Shapes Importing Plans from AutoCAD/Vectorworks Interior Space Design Doors, Windows, Railings, Trees, and Stairs Modifiers Compound Objects (Connect, Scatter, Pro Boolean, Loft, Terrain) Bend, Taper, Twist, Stretch, Skew, FFD, Wave, and Ripple Lattice and Lathe Techniques 3ds Max Basic Lighting Omni Light Spot Light Direct Light 3ds Max Camera Techniques Free Camera Target Camera Texturing and Rendering Diffuse and Bump Mapping Incorporating Environment and Background Images Rendering Images with Advanced Lighting in 3ds Max For a hands-on experience, access a free 30-day trial of 3ds Max, a robust 3D modeling and rendering software for design visualization, games, and animation, via Autodesk's official website. Download 3ds max. Autodesk Download a free 30 day trial of 3ds Max, 3D modelling and rendering software. Learning Outcomes after 3ds Max: Advanced 3D Skills: Master intricate 3D modeling, animation, and rendering techniques. Project Experience: Apply skills to real-world projects, building a professional portfolio. Problem-Solving: Develop critical thinking for complex design challenges. Potential Jobs: 3D Modeler: Create detailed 3D models for various industries. Character Animator: Animate lifelike characters for entertainment media. Architectural Visualizer: Produce realistic architectural renders. Interior Designer: Visualize and present interior designs. Game Environment Artist: Design immersive game environments. Product Visualization Specialist: Render detailed product visuals. Visual Effects Artist: Create stunning visual effects for film/TV. Freelance 3D Artist: Take on diverse projects as an independent professional. Details: Duration: 10 Hours of Comprehensive Training Focus: Advanced 3D Modeling, Animation, and Rendering Techniques Learning Format: Personalized One-on-One Sessions for Maximum Attention Availability: Flexible Scheduling, Monday to Saturday, 9 am to 7 pm Instructors: Certified Experts and Industry Professionals Materials: Certificate of Completion and Extensive Training Guides Interactive Learning: Live Feedback Sessions and Access to Recorded Classes Support: Lifetime Email and Phone Assistance for Continued Learning Special Benefits: Competitive Rates, Referral Discounts, and Assistance with Software Installation This intensive 3ds Max Masterclass provides advanced training in 3D design and animation, ensuring personalized attention, interactive learning, and lifelong support for your creative journey. Personalized Instruction: Skilled trainers provide tailored one-on-one coaching, meeting your unique learning requirements. Practical Learning: Participate in hands-on demonstrations, strengthening skills applicable in design, gaming, and film industries. Comprehensive Materials: Obtain a Certificate of Attendance and detailed guides for continuous reference. Interactive Engagement: Engage in live sessions with tutors, gaining valuable feedback and access to session recordings. Flexible Learning: Choose between online or in-person sessions, aligning with your schedule and preferences. Value and Support: Benefit from competitive rates, referral discounts, and lifelong assistance via email and phone. Seamless Start: Get help with software installation, ensuring a smooth and hassle-free learning experience.
Improve your awareness of mental health and the challenges faced by seafarers, in ISWAN's Maritime Mental Health Awareness training.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Asbestos bulk analysts and laboratory analysts. Anyone who manages asbestos analysts or requires a deeper understanding of the asbestos analysis process (e.g. Laboratory Quality Manager) Prior Knowledge and Understanding Candidates for this course are expected to be aware of HSG 248 Asbestos: The Analysts' Guide (July 2021), and in particular Appendix 2: Determination of asbestos in bulk materials. Candidates will preferably have prior experience of analysing bulk samples and may already be participating in a quality control scheme. In addition, candidates are expected to have had training to cover the core competencies outlined within the foundation material detailed within Table A9.1 of HSG248 Asbestos: The Analysts' Guide (July 2021). This may be achieved by In -house learning or through the P400 foundation module.
3ds Max and Vray Training 1-2-1
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.