• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

602 Courses delivered Live Online

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe network architectures, devices, and software used by service providers Describe the various Internet governance organizations, their roles, and tools available for governance information verification Configure Cisco Internetwork Operating System (Cisco IOS) and Cisco IOS XE routers Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks Describe various access and core technologies used by service providers Describe various major switching technologies used by service providers Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN) Describe various major routing protocols used by service providers Configure Layer 3 services used by service providers Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage Describe usage of various services used and maintained by service providers Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software This course is designed to provide you with the foundational knowledge for the suite of Cisco© CCNP© Service Provider courses. The course expands what you learned from the Cisco CCNA© course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. Course Outline Introducing Service Provider Architectures Describing Internet Governance Organizations Configuring the Cisco IOS and Cisco IOS XE Router Configuring Cisco IOS XR Router Introducing Access and Core Technologies in the Service Provider Environment Introducing Routing Technologies in the Service Provider Environment Describing MPLS Implementing Layer 3 Services Introducing Switching Technologies in the Service Provider Environment Introducing Overlay Technologies Implementing Service Provider Services Introducing Programmability on Cisco IOS XR Routers Lab outline Review Lab Environment Examine Governance Data Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices Perform Initial Cisco IOS XR Configuration Configure and Verify Connectivity on Cisco IOS XR Configure Intermediate System to Intermediate System (IS-IS) Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng) Configure Basic Border Gateway Protocol (BGP) Configure MPLS Configure Internet Protocol Service Level Agreement (IP SLA) Configure Hot Standby Router Protocol (HSRP) with Object Tracking Configure Virtual Routing and Forwarding (VRFs) Configure Network Time Protocol (NTP) Use Linux Command Line Interface Configure IOS XR Using a Bash Script

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)
Delivered OnlineFlexible Dates
Price on Enquiry

Smart sales prospecting (In-House)

By The In House Training Company

As technology continues to develop and increasingly interact with our daily lives, so must our sales techniques to ensure we're leveraging advances in how people do business to our advantage. It is essential for all salespeople to understand how to navigate the various tools at our disposal and grow their skills and confidence to put them into action in order to build a solid business pipeline. We have developed this programme to be practical, fun and interactive, whilst ensuring that participants will learn how to utilise new technology to their advantage, self-generate new business leads and opportunities, gain additional business and referrals from existing contacts, and save time and effort using proven business development skills. This course will help participants: Understand the 'organized persistence' model of sales prospecting Develop skills in using video, online and social media to generate interest Understand how to write effective sales and outreach emails and using online tools Develop techniques for effectively managing telephone appointments Learn ways to use LinkedIn for connecting with customers and prospects Develop networking skills and learn how to source and develop referrals and professional introductions 1 Key principles of smart sales prospecting Set your sales prospecting goals and objectives Elevator pitch, core messages and your value proposition Targeting and segmenting your market 'Organised persistence' using your CRM effectively 2 Setting appointments by telephone - planning and preparation Why calling still works and the best times to call Creating a call prompt sheet: Opening a call and taking control Giving a reason to meet Key questions to ask Overcoming the cold calling blues 3 Setting appointments by telephone - advanced skills Giving a reason to meet and 'selling the appointment' Key questions to ask that will create interest and motivation to meet Voice tone, power words, phrasing, pausing, responding Getting past gatekeepers and getting through 4 Using LinkedIn for research and follow-up Why LinkedIn matters and how to use it Finding new contacts, connecting and Inmailing Short-cuts and advanced skills 5 Email strategies that work Using AIDA and other templates for sales emails Using personalized video emails to create interest Vertical targeting emails, with examples Building awareness with an email chain

Smart sales prospecting (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Cisco Partner Sales Engineers and Field engineers supporting customers with 802.1x solutions. The primary audience for this course is Cisco Channel Partner SEs and FEs that are seeking to meet the education requirements to attain ATP authorization to sell Cisco ISE. The secondary audience for this course is security architects, design engineers, and others seeking hands-on experience with Cisco TrustSec 802.1X deployments with Cisco ISE Overview Upon completing this course, students will be able to meet these objectives:- Describe identity-based networking concepts and components - Define the components and processes of port-based authentication - Identify the 802.1X components and their interrelation at a high level - Identify requirements and options for non-supplicant devices - Position individual components of an 802.1X network and identify compatibilities Students will gain the foundational knowledge of IEEE 802.1X protocol; the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation; hands-on experience configuring a network for 802.1X-based network services. Cisco TrustSec Surveying Cisco TrustSec Surveying Cisco TrustSec Architecture Components Port-Based Authentication Surveying the IEEE 802.1X Standard Surveying 802.1X and EAP Surveying 802.1X and EAP Configure Devices for 802.1X Operation Identifying 802.1X Components and Topologies Identifying 802.1X Components and Topologies Configuring Network Devices for 802.1X Configuring Supplicants for 802.1X Operation Configure Guest Access Configuring Cisco TrustSec for Non-Supplicant Devices Configuring Cisco WebAuth for Non-Supplicant Devices Design Cisco TrustSec Networks with Cisco ISE and 802.1X Identifying Component Compatibilities with 802.1X Reviewing 802.1X Design Considerations that Impact Implementation Reviewing Scalable 802.1X Architectures Additional course details: Nexus Humans Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel partners and resellers Network administrators Network engineers Sales engineers System engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components. Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance. Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access. Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding. Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network. Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access. Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes. Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network. Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless. Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution Describe the use cases and migration scenarios for migrating users from traditional campus to SD The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco© SD-Access fits into Cisco Digital Network Architecture (Cisco DNA?). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended. Course Outline Introducing Cisco DNA Architecture Cisco DNA Center Design Cisco DNA Center Inventory Cisco DNA Center Automation Explore Cisco DNA Center and Automating Network Changes Introducing Cisco Software-Defined Access Deploying Cisco Software-Defined Access Deploy Wired Fabric Networks with Cisco DNA Center Cisco SD-Access for Wireless Cisco SD-Access Extension for IoT Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center Migrating to Cisco SD-Access Cisco SD-Access Multicast Integrating Cisco DNA Center Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications Understanding Programmable Network Infrastructure Operating and Managing Cisco DNA Infrastructure Test Drive Cisco DNA Center APIs

Cisco Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1
Delivered OnlineFlexible Dates
Price on Enquiry

The Hot Directors Live Training Course

4.0(1)

By JJFILMworks London Ltd Film School

Unlock Your Filmmaking Potential with Taraq Qureshi** Discover the art of filmmaking with Taraq Qureshi, an acclaimed British producer, director, and actor. With over 20 years of experience in the film industry and a unique perspective as a disabled filmmaker, Taraq brings a wealth of knowledge and passion to his teaching. **About Taraq Qureshi:** - **Seasoned Filmmaker**: With over two decades of experience, Taraq has produced and directed numerous feature films and short films. His journey began in community theatre with a year-long course accredited by Middlesex University London in 1999. - **Industry Leader**: Founder and artistic director of the "Golden Nugget International Film Festival," which has been running for six years. In 2023, Taraq also founded the "Global Film Producers Alliance" (www.gfa.com), a platform dedicated to connecting and supporting film producers worldwide. - **Innovative Storyteller**: Taraq's notable projects include "Strictly Salsa - The Beginning," "The Chosen Ones," and "Do Not Enter." His work is marked by a deep passion for storytelling and a commitment to creating both commercially successful and niche market films. - **Mentor and Educator**: As an acting teacher, creative executive, and development coordinator, Taraq has inspired countless aspiring filmmakers to pursue their dreams and achieve success in the industry. **Why Learn from Taraq?** - **Expert Guidance**: Gain insights from a seasoned professional with a proven track record in the film industry. - **Unique Perspective**: Learn from Taraq's experiences as a disabled filmmaker, providing a fresh and inclusive approach to storytelling. - **Hands-On Learning**: Benefit from practical, real-world advice and techniques that you can apply to your own filmmaking projects. - **Community and Support**: Join a network of passionate filmmakers and industry professionals through Taraq's initiatives, including the "Golden Nugget International Film Festival" and the "Global Film Producers Alliance." **Enroll Now and Transform Your Filmmaking Journey!** Don't miss this opportunity to learn from one of the industry's most respected and innovative filmmakers. Enroll in Taraq Qureshi's online teaching course today and take the first step towards realizing your filmmaking dreams. #Master the Art of Film Directing: Enroll in Our Comprehensive 10-Day Course!** Are you passionate about storytelling? Do you dream of bringing your cinematic visions to life? Our 10-day course on Feature Film Directing is your gateway to mastering the craft and making your mark in the film industry! #### **Course Highlights:** 🎬 **Expert Instruction:** Learn from seasoned directors and industry professionals. 📜 **Script Analysis:** Break down screenplays and develop compelling characters. 🎥 **Visual Storytelling:** Master cinematography, shot composition, and visual style. 👥 **Actor Collaboration:** Discover techniques for casting and directing actors. 🎨 **Production Design:** Create immersive sets, props, and costumes. 🎧 **Sound and Music:** Enhance your film with expert sound design and music. ✂️ **Editing Mastery:** Gain hands-on experience in editing and post-production. 📣 **Marketing and Distribution:** Learn to promote and distribute your film successfully. 🌟 **Final Project:** Showcase your skills with a short film project and receive valuable feedback. #### **Who Should Enroll:** - Aspiring Directors - Film Students - Storytellers and Creatives - Film Enthusiasts #### **Why Choose Our Course:** - **Intensive Learning:** Each 90-minute session is packed with valuable insights and practical exercises. - **Hands-On Experience:** Apply what you learn with real-world projects and interactive sessions. - **Networking Opportunities:** Connect with fellow filmmakers and industry experts. - **Flexible Schedule:** Designed to fit into your busy lifestyle. #### **Ready to Start Your Directing Journey?** Don't miss this opportunity to turn your passion for film into a rewarding career. Enroll now and take the first step towards becoming a masterful film director! --- *Limited seats available. Sign up today to secure your spot!* 🎥✨ --- ### **Day 1: Introduction to Directing** - **Welcome and Course Overview:** - Introduction to the role of a film director. - Course objectives and expectations. - **History of Film Directing:** - Overview of influential directors and their contributions. - Evolution of directing styles and techniques. --- ### **Day 2: Script Analysis and Development** - **Script Breakdown:** - Understanding the screenplay. - Identifying themes, characters, and plot structure. - **Character Development:** - Techniques for creating and developing characters. - Analyzing character arcs. --- ### **Day 3: Visual Storytelling** - **Cinematography Basics:** - Shot composition and framing. - Camera movements and angles. - **Visual Style:** - Creating a visual style and tone. - Working with a cinematographer. --- ### **Day 4: Working with Actors** - **Casting:** - Techniques for casting the right actors. - Conducting auditions. - **Directing Actors:** - Techniques for effective communication. - Understanding actors' needs and processes. --- ### **Day 5: Production Design** - **Set Design:** - Understanding the importance of production design. - Working with the production designer. - **Props and Costumes:** - The role of props and costumes in storytelling. - Collaborating with the art department. --- ### **Day 6: Sound and Music** - **Sound Design:** - Basics of sound recording and mixing. - Creating an audio landscape. - **Music in Film:** - The role of music in enhancing the narrative. - Working with a composer. --- ### **Day 7: Editing and Post-Production** - **Editing Techniques:** - Understanding the editing process. - Types of cuts and transitions. - **Post-Production Workflow:** - Overview of post-production stages. - Collaborating with editors and post-production teams. --- ### **Day 8: Directing on Set** - **Pre-Production Planning:** - Creating a shooting schedule. - Conducting technical rehearsals. - **On-Set Communication:** - Managing the cast and crew. - Problem-solving on set. --- ### **Day 9: Marketing and Distribution** - **Film Festivals and Markets:** - Overview of film festivals and markets. - Strategies for submitting and promoting films. - **Distribution Channels:** - Understanding traditional and digital distribution. - Creating a distribution plan. --- ### **Day 10: Final Project and Presentation** - **Project Work:** - Finalizing the short film project. - Preparing for the presentation. - **Presentations:** - Screening of short films. - Feedback and discussion. - **Course Wrap-Up:** - Reflecting on the course experience. - Final thoughts and future steps. --- This version is condensed to fit into 90-minute sessions, ensuring each lesson is focused and impactful. Does this meet your expectations? Of course! Here's a revised version of the 10-day course, with 90-minute sessions each day: --- ### **Day 1: Introduction to Directing** - **Welcome and Course Overview:** - Introduction to the role of a film director. - Course objectives and expectations. - **History of Film Directing:** - Overview of influential directors and their contributions. - Evolution of directing styles and techniques. --- ### **Day 2: Script Analysis and Development** - **Script Breakdown:** - Understanding the screenplay. - Identifying themes, characters, and plot structure. - **Character Development:** - Techniques for creating and developing characters. - Analyzing character arcs. --- ### **Day 3: Visual Storytelling** - **Cinematography Basics:** - Shot composition and framing. - Camera movements and angles. - **Visual Style:** - Creating a visual style and tone. - Working with a cinematographer. --- ### **Day 4: Working with Actors** - **Casting:** - Techniques for casting the right actors. - Conducting auditions. - **Directing Actors:** - Techniques for effective communication. - Understanding actors' needs and processes. --- ### **Day 5: Production Design** - **Set Design:** - Understanding the importance of production design. - Working with the production designer. - **Props and Costumes:** - The role of props and costumes in storytelling. - Collaborating with the art department. --- ### **Day 6: Sound and Music** - **Sound Design:** - Basics of sound recording and mixing. - Creating an audio landscape. - **Music in Film:** - The role of music in enhancing the narrative. - Working with a composer. --- ### **Day 7: Editing and Post-Production** - **Editing Techniques:** - Understanding the editing process. - Types of cuts and transitions. - **Post-Production Workflow:** - Overview of post-production stages. - Collaborating with editors and post-production teams. --- ### **Day 8: Directing on Set** - **Pre-Production Planning:** - Creating a shooting schedule. - Conducting technical rehearsals. - **On-Set Communication:** - Managing the cast and crew. - Problem-solving on set. --- ### **Day 9: Marketing and Distribution** - **Film Festivals and Markets:** - Overview of film festivals and markets. - Strategies for submitting and promoting films. - **Distribution Channels:** - Understanding traditional and digital distribution. - Creating a distribution plan. --- ### **Day 10: Final Project and Presentation** - **Project Work:** - Finalizing the short film project. - Preparing for the presentation. - **Presentations:** - Screening of short films. - Feedback and discussion. - **Course Wrap-Up:** - Reflecting on the course experience. - Final thoughts and future steps. --- This version is condensed to fit into 90-minute sessions, ensuring each lesson is focused and impactful. Let me know if there is anything you want help with taraqqureshi@gmail.com

The Hot Directors Live Training Course
Delivered OnlineFlexible Dates
£499

Assertiveness for Assessors and Trainers

4.0(1)

By Panda Education and Training Ltd

Are you an assessor or a trainer looking to enhance your effectiveness and communication skills? Do you find it challenging to confidently express your thoughts, to get what you want from situations and to maintain control during training sessions or assessments?  If so, our “Assertiveness for Assessors and Trainers” live online workshop is made for you. Effective Communication: Assertiveness empowers you to communicate your ideas clearly, ensuring your message is understood by learners. You’ll learn techniques to express your thoughts confidently, leading to improved engagement and comprehension. Confidence Building: Learn techniques for appearing more confident when communicating with others.  Taking control: Take control of situations through your body language and the verbal / written language you use. Invest in Your Success This 2.5 hour session will help you gain the skills to lead with confidence, communicate effectively, and prioritise yourself in your life.  Further Information This 2.5 hour session held live online via Teams will give you the tools and techniques you need to be more assertive. Workshop Benefits Interactive Workshops: Engage in hands-on activities, role plays, and real-world scenarios to practice assertive communication techniques in a safe and supportive environment.Expert Facilitators: Our experienced trainers will guide you through proven strategies, drawing on their expertise in communication, psychology, and training methodologies.Tailored Content: The course content is specifically designed for assessors and trainers, addressing challenges and situations unique to your profession.Practical Tools: Walk away with a toolkit of practical techniques, scripts, and strategies that you can immediately apply in your assessments and training sessions.Networking Opportunities: Connect with fellow assessors and trainers, sharing insights, experiences, and best practices to further enhance your professional journey.

Assertiveness for Assessors and Trainers
Delivered OnlineFlexible Dates
£75

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry