The Master Practitioner in Emotional Intelligence course explores the concept of emotional intelligence in detail building upon what you know to give you a much deeper understanding. The Master Practitioner in Emotional Intelligence course covers the application of emotional intelligence in different circumstances to improve and enhance performance throughout an organisation and extends to decision making stakeholders outside the organisation. The skills and competencies are also applicable in many situations in families, communities and social settings.
This course will let you develop the skillsets needed to guide the delivery of value in a Lean enterprise—and learn about the activities, tools, and mechanics used to manage backlogs and programs. Attending the class prepares you to take the exam and become a certified SAFe® 6 Product Owner/Product Manager (POPM). SAFe Product Owner/Product Manager 6 training course is provided under Scaled Agile, Inc. Partner Program Agreement.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows - IT Staff and Managers - Network and systems personnel and engineers - Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics Overview Upon completing this course, the student will be able to meet these objectives: Students will be able to Deploy and Manage a Meraki Network using the Meraki Dashboard - Deploy, Manage, Monitor and Troubleshoot Meraki MS Switches - Deploy, Manage, Monitor and Troubleshoot Meraki MR Wireless Access Points - Deploy, Manage, Monitor and Troubleshoot Meraki MX Firewall Appliances - Deploy, Manage, Monitor and Troubleshoot Meraki MV IP Video Cameras - Deploy, Manage, Monitor and Troubleshoot Meraki MC Phones - Deploy, Manage, Monitor and Troubleshoot Meraki Systems Manager - Deploy, Manage, Monitor and Troubleshoot Meraki SDWAN This course familiarizes individuals with networking concepts and demonstrates how to effectively use Meraki products to build a comprehensive network Cisco/Meraki Product Line Introduction MS - Switching MR - Wireless LAN MX - Security MV ? Camera MC - Voice SD-WAN Cisco/Meraki Cloud Management Introduction to cloud management The dashboard and navigation Organizations & Networks ? what is the difference and how to use them System-wide parameters (organization parameters) Cisco/Meraki Dashboard Administration Creating and implementing maps Summary Report and Auto Generation Reports Adding administrators and tweaking security levels Using Tags and Configuring Alerting (SNMP, email) Adding admins, configuring reports, and alerts Firmware Management Configuring Authentication Lab 1 Lab 2 Configuring external authentication Configuring Group Policies Device Replacement Location Analytics Other advanced analytics Cisco/Meraki Switching Review switching basics Review Meraki L2 Switch Models Configuring Meraki Switches Troubleshooting / Diagnostics Lab 3 Cisco/Meraki Routing Review routing basic (IP Addresses, Networks and Masks, OSPF, etc.) Review Meraki L3 switch Models Configuring Meraki Switches for Routing Lab 4 Cisco/Meraki Wireless Review Wireless Basics Meraki Wireless Product Review Performing a Site Survey Configuring Access Points Lab 5 Cisco/Meraki Firewalls/Security Review firewall basics Meraki Firewall Model Review Configuring a Meraki Firewall Lab 6 IP Cameras MV21 vs MV71 Installing Cameras Adding Cameras to the Dashboard Managing MV Cameras Troubleshooting Cameras Lab 7 Meraki Communications QOS Voice Security Deploying Meraki MC74 Phones Deploying Cisco IP Phones to CUCM Deploying Voice Features End User Lab 8 Meraki Systems Manager Controlling Wireless Device Policies Enrolling Devices Apps Profiles Tags Security Policies Geofencing Policies Lab 9 Meraki SDWAN What is SD-WAN? Concentrator Mode VPN Topology Split Tunnel Full Tunnel Hub and Spoke VPN Mesh Datacenter Redundancy (DC-DC Failover) Warm Spare (High Availability) for VPN concentrators Connection Monitor Dual-Active VPN uplinks Policy-based Routing Dynamic Path Selection SD-WAN Objectives Example Topology High Level Traffic Flow SD-WAN Technologies Deploying a one-armed concentrator Dashboard Configuration Other Datacenter Configuration MX IP Assignment Upstream Considerations Datacenter Redundancy (DC-DC Failover) High-level architecture Failover Times Datacenter Deployment Branch Deployment Lab 10 Meraki Support Getting support for Meraki Finding the Right Documentation Posting in the Community Troubleshooting Meraki Connectivity Issues Resetting Devices. Additional course details: Nexus Humans Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Anyone who'd like to learn Adobe Premiere Pro CC Those that plan to take the Adobe Certfied Expert (ACE) exam Overview Introduction to Premiere Pro CC will allow you to learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. In this three-day course, you?ll get a thorough overview of the interface, tools, features, and production flow for Premiere Pro CC. The course is an ideal combination of instructor-led demonstration and hands-on practice to introduce you to Adobe Premiere Pro software, a revolutionary 64-bit nonlinear video-editing application. You will learn powerful real-time video and audio editing tools that give you precise control over virtually every aspect of your production. Touring Adobe Premiere Pro CC Nonlinear editing in Adobe Premiere Pro Expanding the workflow Touring the Adobe Premiere Pro interface Setting up a Project Setting up a project Setting up a sequence Importing Media Importing assets Working with the Media Browser Importing images The media cache Capturing the videotape Organizing Media The Project panel Working with bins Organizing media with content analysis Monitoring footage Modifying clips Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential editing commands Working with Clips and Markers Program Monitor controls Controlling resolution Using markers Using Sync Lock and Track Lock Finding gaps in the Timeline Moving clips Extracting and deleting segments Adding Transitions What are transitions? Edit points and handles Adding video transitions Using A/B mode to fine-tune a transition Adding audio transitions Advanced Editing Techniques Four-point editing Retiming clips Replacing clips and footage Nesting sequences Regular trimming Advanced trimming Trimming in the Program Monitor panel Putting Clips in Motion Adjusting the Motion effect Changing clip position, size, and rotation Working with keyframe interpolation Using other motion-related effects Multi-camera Editing The multi-camera process Creating a multi-camera sequence Switching multiple cameras Finalizing multi-camera editing Additional multi-camera editing tips Editing and Mixing Audio Setting up the interface to work with audio Examining audio characteristics Adjusting audio volume Adjusting audio gain Normalizing audio Creating a split edit Adjusting audio levels in a sequence Working with the Audio Mixer Sweetening Sound Sweetening sound with audio effects Adjusting EQ Applying effects in the Audio Mixer Cleaning up noisy audio Adding Video Effects Working with effects Keyframing effects Effects presets Frequently used effects Color Correction and Grading Color-oriented workflow An overview of color-oriented effects Fixing exposure problems Fixing color balance Specials color effects Creating a look Exploring Compositing Techniques What is an alpha channel? Using compositing in your projects Working with the Opacity effect Working with alpha-channel transparencies Color keying a greenscreen shot Using mattes Creating Titles An overview of the Titler window Video typography essentials Creating titles Stylizing text Working with shapes and logos Making text roll and crawl Managing Your Projects The File menu Using the Project Manager Final project managment steps Importing projects or sequences Managing collaboration Managing your hard drives Exporting Frames, Clips, and Sequences Overview of export options Exporting single frames Exporting a master copy Working with Adobe Media Encoder Exchanging with other editing applications Recording to tape Additional course details: Nexus Humans Introduction to Premiere Pro CC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Premiere Pro CC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2.5 Days 15 CPD hours This course is intended for This course is intended for those with a basic understanding of Tableau who want to pursue mastery of the advanced features. Overview The goal of this course is to present essential Tableau concepts and its advanced functionalities to help better prepare and analyze data. This course will use Tableau Hyper, Tableau Prep and more. Getting Up to Speed ? a Review of the Basics Connecting Tableau to your data Connecting to Tableau Server Connecting to saved data sources Measure Names and Measure Values Three essential Tableau concepts Exporting data to other devices Summary All About Data ? Getting Your Data Ready Data mining and knowledge discovery process models CRISP?DM All About Data ? Joins, Blends, and Data Structures All About Data - Joins, Blends, and Data Structures Introduction to joins Introduction to complex joins Exercise: observing join culling Introduction to join calculations Introduction to spatial joins Introduction to unions Understanding data blending Order of operations No dimensions from a secondary source Introduction to scaffolding Introduction to data structures Exercise: adjusting the data structure for different questions Summary Table Calculations Table Calculations A definition and two questions Introduction to functions Directional and non-directional table calculations Application of functions Summary Level of Detail Calculations Level of Detail Calculations Building playgrounds Playground I: FIXED and EXCLUDE Playground II: INCLUDE Practical application Exercise: practical FIXED Exercise: practical INCLUDE Exercise: practical EXCLUDE Summary Beyond the Basic Chart Types Beyond the Basic Chart Types Improving popular visualizations Custom background images Tableau extensions Summary Mapping Mapping Extending Tableau's mapping capabilities without leaving Tableau Extending Tableau mapping with other technology Exercise: connecting to a WMS server Exploring the TMS file Exploring Mapbox Accessing different maps with a dashboard Creating custom polygons Converting shape files for Tableau Exercise: polygons for Texas Heatmaps Summary Tableau for Presentations Tableau for Presentations Getting the best images out of Tableau From Tableau to PowerPoint Embedding Tableau in PowerPoint Animating Tableau Story points and dashboards for Presentations Summary Visualization Best Practices and Dashboard Design Visualization Best Practices and Dashboard Design Visualization design theory Formatting rules Color rules Visualization type rules Compromises Keeping visualizations simple Dashboard design Dashboard layout Sheet selection Summary Advanced Analytics Advanced Analytics Self-service Analytics Use case ? Self-service Analytics Use case ? Geo-spatial Analytics Summary Improving Performance Improving Performance Understanding the performance-recording dashboard Exercise: exploring performance recording in Tableau desktop Performance-recording dashboard events Behind the scenes of the performance- recording dashboard Hardware and on-the-fly techniques Hardware considerations On-the-fly-techniques Single Data Source > Joining > Blending Three ways Tableau connects to data Using referential integrity when joining Advantages of blending Efficiently working with data sources Tuning data sources Working efficiently with large data sources Intelligent extracts Understanding the Tableau data extract Constructing an extract for optimal performance Exercise: summary aggregates for improved performance Optimizing extracts Exercise: materialized calculations Using filters wisely Extract filter performance Data source filter performance Context filters Dimension and measure filters Table-calculation filters Efficient calculations Boolean/Numbers > Date > String Additional performance considerations Avoid overcrowding a dashboard Fixing dashboard sizing Setting expectations Summary Additional course details: Nexus Humans Advanced Tableau training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Tableau course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This programme has been specifically designed to help experienced trainers, facilitators and coaches use Everything DiSC and the Five Behaviours assessments, and deliver workshops, with their own clients and in-house teams.
Jewellery has been an integral part of fashion since ages. Jewellery design has been considered as a timeless piece of art. This course in jewellery design gives a base to the students in varied designs, techniques, and tools necessary to graduate as a professional jewellery designer. The course commences with basics in drawing such as basic views of jewellery and theory that covers jewellery manufacturing, gemology and diamond assorting. The students get to design and create their own fashion jewelry as part of the curriculum. To induce modern design tools, the students are trained to ensure the students are well versed with the latest technological dimension of jewelry design. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module 01 Deciding What Types Of Products To Create 01:30:00 Selling Your Products 01:00:00 Pricing Your Products For Maximum Profits 02:00:00 Module 02 Express Your Creativity with Clothing You Design Yourself! 01:00:00 Planning Your Design 01:00:00 Elements of Design 01:00:00 Your Basic Block or Fitting 00:30:00 Simple Variations on the Basic Block 01:00:00 Module 03 Maintaining Balance and Proportion 01:00:00 Design with Fabric and Color 01:00:00 Where to Find Inspiration for Your Designs 01:00:00 Explore the World and Find Inspiration in Ethnic Fashions 01:00:00 Look to the Past for Historic Inspiration 01:00:00 Putting the Pieces Together 01:00:00 Module 04 How To Make: Pinky Thread Bear Pattern 03:00:00 Merry Marionettes 01:00:00 Safety Pin Holder 00:15:00 Three Curtain Pulls 00:30:00 Heart Sachet 00:30:00 Module 05 Whisk Broom Holder 00:15:00 Towel Ring Holder 00:15:00 Sewing Kit 00:30:00 Square Sachet 00:30:00 Small Pin Cushion 00:30:00 Large Pin Cushion 01:00:00 Module 06 HISTORY OF FASHION DESIGNING 00:30:00 THEORY OF COLOUR 00:30:00 GARMENT DETAILS 00:30:00 BODY TYPE 00:30:00 SEWING MACHINE & PRACTICE 00:30:00 COMMON MACHINE PROBLEMS 00:30:00 PATTERN TERMINOLOGY 01:00:00 SEWING AIDS 00:30:00 NEEDLE AND THREAD 00:30:00 Module 07 ESSENTIAL TERMINOLOGY OF FASHION INDUSTRY 00:30:00 BASIC HAND STITCHES 00:30:00 SEAMS 00:30:00 FIBRES AND FABRICS 01:00:00 DIFFERENT TYPES OF FABRICS 00:30:00 TRIMS 00:30:00 FABRIC CARE 00:30:00 SPOTS AND STAIN REMOVAL 00:30:00 GARMENT FITTING 00:30:00 SKETCHING 00:30:00 Module 08 HOW TO TAKE MEASUREMENTS 00:30:00 WOMEN'S SIZE CHART 00:30:00 MEN'S SIZE CHART 00:30:00 SIZE CHART FOR KIDS (IN INCHES) 00:30:00 SEAM ALLOWANCES 00:30:00 MEASURE FROM A GARMENT 00:30:00 FABRIC REQUIREMENT 00:30:00 MULTI POCKET APRON 00:30:00 BATUA 00:30:00 CUSHION COVER 00:30:00 Module 09 DECORATIVE HAND TOWEL 00:30:00 DECORATIVE PLACEMAT 00:30:00 JEWELLERY BOX 00:30:00 BED SHEET 00:30:00 MULTI PANELLED CURTAIN 00:30:00 WALL HANGING 00:30:00 TABLE CLOTH 00:30:00 TABLE MATS, COASTERS & NAPKINS 00:30:00 ACCESSORIES 00:30:00 BASIC BODICE BLOCK 00:30:00 Module 10 PANELLED TOP WITH CUFF SLEEVES 00:30:00 FRONT OPEN TOP WITH TIE AT NECKLINE 00:30:00 HALF SLEEVE TOP WITH SHOULDER FLAP 00:30:00 ROLL UP HALF SLEEVE SHIRT 00:30:00 BASIC SKIRT BLOCK 00:30:00 SEMI CIRCULAR KNEE LENGTH SKIRT 00:30:00 BASIC TROUSER BLOCK FOR WOMEN 00:30:00 FLAT FRONT TROUSER 00:30:00 CAPRIS 00:30:00 SHAMIEZ 00:30:00 Module 11 SIMPLE KURTA WITH NECK AND SLEEVE OPTIONS 00:30:00 PRINCESS SHIRT (LADIES) 00:30:00 PATCHWORK KURTA 00:30:00 ANGRAKHA 00:30:00 SQUAT 00:30:00 WOMEN'S CHURIDAR 00:30:00 PLAIN PAJAMA - LADIES 00:30:00 SALWAR WITH BELT 00:30:00 DOGRIS 00:30:00 ODHNI / SHAWL 00:30:00 SIX PANELLED PETTICOAT 00:30:00 Module 12 PLAIN BLOUSE 00:30:00 BLOUSE WITH LINING 00:30:00 NIGHT SUIT 00:30:00 KAAFTAAN 00:30:00 NIGHTIE 00:30:00 NIGHTIE AND GOWN SET (2 piece) 00:30:00 FULL LENGTH WRAP AROUND SKIRT 00:30:00 BASIC SHIRT BLOCK FOR MEN 00:30:00 SHIRT (HALF SLEEVE) 00:30:00 FORMAL MEN'S SHIRT (FULL SLEEVE) 00:30:00 ALIGARHI PAJAMA (VARIATION) 00:30:00 Module 13 BASIC TROUSER BLOCK FOR MEN 00:30:00 FLAT FRONT TROUSER 00:30:00 MEN'S CHURIDAR 00:30:00 CARGO PANTS 00:30:00 ACHKAN 00:30:00 KALIDAR KURTA 00:30:00 NEHRU KURTA 00:30:00 BENGALI KURTA 00:30:00 WAISTCOAT 00:30:00 DENIM JACKET 00:30:00 Module 14 BIB 00:30:00 FEEDER 00:30:00 BABY PANTIES 00:30:00 TODDLER'S FROCK (JHABLA 1) 00:30:00 BABA SUIT 00:30:00 SLIP 01:00:00 BLOOMER (For 6 Month Old) 00:30:00 UNDERWEAR WITH GUSSET 00:30:00 JANGHIA 00:30:00 TOP 00:30:00 Module 15 SHIRT 00:30:00 SUN SUIT 00:30:00 PLEATED SKIRT 00:30:00 SPORTS SKIRT FOR GIRLS (DIVIDED SKIRT) 00:30:00 SIMPLE FROCK 00:30:00 A-LINE FROCK 00:30:00 UMBRELLA FROCK 00:30:00 DUNGAREES 00:30:00 JUMP SUIT 00:30:00 DECORATIVE BABY BAG 00:30:00 Module 16 Jewellery Making and Beading 00:30:00 History of Beads 01:00:00 Different Kinds of Beads and Its Definitions 00:30:00 Different Kinds of Gemstones and Its Definitions 01:00:00 Decorating Jewellery and Beads 01:00:00 Making Magic with Beads, Crystals, Pearls and Stones 02:00:00 Setting Up Your Workshop 00:30:00 Discovering Simple Jewelry Making Techniques 00:30:00 Uncovering the Simple Secrets of Stringing and Knotting 00:30:00 Different Stringing and Knotting Jewelry Projects 00:30:00 Different Wire Wrapping Jewelry Projects 03:00:00 Common Jewelry Mistakes to Avoid 00:30:00 Jewelry for Every Occasion 00:30:00 Creating Fun, Funky Jewelry for Everyday Wear 00:30:00 Everyday Jewelry Projects 01:00:00 Crafting your Own Evening, Bridal and Holiday Jewelry 01:00:00 Evening Jewelry Projects 01:00:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is geared for Python experienced attendees who wish to learn and use basic machine learning algorithms and concepts. Students should have skills at least equivalent to the Python for Data Science courses we offer. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to Understand the main concepts and principles of predictive analytics Use the Python data analytics ecosystem to implement end-to-end predictive analytics projects Explore advanced predictive modeling algorithms w with an emphasis on theory with intuitive explanations Learn to deploy a predictive model's results as an interactive application Learn about the stages involved in producing complete predictive analytics solutions Understand how to define a problem, propose a solution, and prepare a dataset Use visualizations to explore relationships and gain insights into the dataset Learn to build regression and classification models using scikit-learn Use Keras to build powerful neural network models that produce accurate predictions Learn to serve a model's predictions as a web application Predictive analytics is an applied field that employs a variety of quantitative methods using data to make predictions. It involves much more than just throwing data onto a computer to build a model. This course provides practical coverage to help you understand the most important concepts of predictive analytics. Using practical, step-by-step examples, we build predictive analytics solutions while using cutting-edge Python tools and packages. Hands-on Predictive Analytics with Python is a three-day, hands-on course that guides students through a step-by-step approach to defining problems and identifying relevant data. Students will learn how to perform data preparation, explore and visualize relationships, as well as build models, tune, evaluate, and deploy models. Each stage has relevant practical examples and efficient Python code. You will work with models such as KNN, Random Forests, and neural networks using the most important libraries in Python's data science stack: NumPy, Pandas, Matplotlib, Seabor, Keras, Dash, and so on. In addition to hands-on code examples, you will find intuitive explanations of the inner workings of the main techniques and algorithms used in predictive analytics. The Predictive Analytics Process Technical requirements What is predictive analytics? Reviewing important concepts of predictive analytics The predictive analytics process A quick tour of Python's data science stack Problem Understanding and Data Preparation Technical requirements Understanding the business problem and proposing a solution Practical project ? diamond prices Practical project ? credit card default Dataset Understanding ? Exploratory Data Analysis Technical requirements What is EDA? Univariate EDA Bivariate EDA Introduction to graphical multivariate EDA Predicting Numerical Values with Machine Learning Technical requirements Introduction to ML Practical considerations before modeling MLR Lasso regression KNN Training versus testing error Predicting Categories with Machine Learning Technical requirements Classification tasks Credit card default dataset Logistic regression Classification trees Random forests Training versus testing error Multiclass classification Naive Bayes classifiers Introducing Neural Nets for Predictive Analytics Technical requirements Introducing neural network models Introducing TensorFlow and Keras Regressing with neural networks Classification with neural networks The dark art of training neural networks Model Evaluation Technical requirements Evaluation of regression models Evaluation for classification models The k-fold cross-validation Model Tuning and Improving Performance Technical requirements Hyperparameter tuning Improving performance Implementing a Model with Dash Technical requirements Model communication and/or deployment phase Introducing Dash Implementing a predictive model as a web application Additional course details: Nexus Humans Hands-on Predicitive Analytics with Python (TTPS4879) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Hands-on Predicitive Analytics with Python (TTPS4879) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.