Successful communications are all about making the message as simple as possible – but this can be difficult when the subjects we're talking about are inherently complicated. Academic institutions, tech companies, health organisations, charities and many others have complex ideas, processes and systems at the heart of what they do. This course is for anybody who needs to distill information down into key messages for important stakeholders, funders and investors, decision makers and members of the public. You’ll learn proven techniques for grabbing attention and changing minds through presentations and public speaking, infographics and data visualisations, and written reports and online posts. We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve. Sample learning content Session 1: Understanding your audience Matching your objectives to your audience's motivations. Identifying the right tone and language. Understanding how, where and when your audience wants to be spoken to. Session 2: Refining your objectives Breaking down strategic aims into tactical steps Metrics and milestones: defining and measuring progress and success. Rapidly building a brief for your communications. Session 3: Telling the story Using metaphors, visuals, comparisons to frame your narrative. From slide decks to online campaigns - choosing the right formats for delivering your message. Selecting communications channels to maximise reach and impact. Session 4: Keeping it going Processes and systems for launching and maintaining communications campaigns. Building social proof – creating and curating content. Troubleshooting and preparing for common challenges. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “We’ve now worked with Alan for almost 3 years, and during that time he has continued to deliver the highest quality training for our clients and delegates. Alan’s passionate delivery style has continued to deliver innovative training solutions to over 1500 delegates across the public, private and voluntary sector. Each of our courses with him has always delivered exceptional feedback and satisfaction levels.” Joe Barlow | Head of Programme, Understanding ModernGov
To drive actions and get decisions made, you need to be able to present effectively to customers, clients, senior managers or colleagues. The perfect presentation is a potent combination of content, design and delivery You need to distill down complex concepts, large data sets, intricate processes and innovative ideas. You need to make the right design choices to ensure your slide decks communicate quickly (as well as looking great). And you need the confidence and storytelling techniques to lead your audience through the content. This course is for anyone who regularly needs to create and deliver presentations for different stakeholders. It will cover how to plan, design and deliver brilliant presentations. Sample learning content Session 1: Planning a presentation Assessing the needs and level of understanding of your audience. Frameworks for building a logical and compelling narrative. Emphasising key messages, while allowing for deep dives and questions. Session 2: Presenting data and processes Understand graphical perception and how people absorb visual information. Effective charts for different types of data stories. How to display processes, timelines and organisational structures. Session 3: Design tricks Using colours to add emphasis and meaning. Creating hierarchies of information to help your audience. Building templates and style guides. Session 4: Delivery techniques Perfecting your performance in-person or online. Dealing with difficult questions and hostile audiences. Refining the beginning, middle and end of your narrative. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial "We’ve now worked with Alan for almost 3 years, and during that time he has continued to deliver the highest quality training for our clients and delegates. Alan’s passionate delivery style has continued to deliver innovative training solutions to over 1500 delegates across the public, private and voluntary sector. Each of our courses with him has always delivered exceptional feedback and satisfaction levels." Joe Barlow | Head of Programme, Understanding ModernGov
Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who wish to develop cloud computing skills to enable them to move IT workloads to the cloud and integrate products and services from different providers and industries. Their focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors. This course is also designed for students who are preparing to take the CompTIA Cloud+ certification exam CV0-003, or who plan to use Cloud+ as the foundation for more advanced cloud certifications or career roles. Overview In this course, you will deploy, test, secure, manage, optimize, and troubleshoot a cloud solution. You will: - Prepare to deploy cloud solutions - Deploy a pilot project - Test a pilot project deployment - Design a secure network for cloud deployment - Determine CPU and memory sizing for cloud deployments - Determine storage requirements for cloud deployments - Plan Identity and Access Management for cloud deployments - Analyze workload characteristics to ensure successful migration to the cloud - Secure systems to meet access requirements - Maintain cloud systems - Implement backup, restore, and business continuity measures - Analyze cloud systems for required performance - Analyze cloud systems for anomalies and growth forecasting - Troubleshoot deployment, capacity, automation, and orchestration issues - Troubleshoot connectivity issues - Troubleshoot security issues In this course, you will learn how to implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. 1 - PREPARING TO DEPLOY CLOUD SOLUTIONS Describe Interaction of Cloud Components and Services Describe Interaction of Non-cloud Components and Services Evaluate Existing Components and Services for Cloud Deployment Evaluate Automation and Orchestration Options Prepare for Cloud Deployment 2 - DEPLOYING A PILOT PROJECT Manage Change in a Pilot Project Execute Cloud Deployment Workflow Complete Post-Deployment Configuration 3 - TESTING PILOT PROJECT DEPLOYMENTS Identify Cloud Service Components for Testing Test for High Availability and Accessibility Perform Deployment Load Testing Analyze Test Results 4 - DESIGNING A SECURE AND COMPLIANT CLOUD INFRASTRUCTURE Design Cloud Infrastructure for Security Determine Organizational Compliance Needs 5 - DESIGNING AND IMPLEMENTING A SECURE CLOUD ENVIRONMENT Design Virtual Network for Cloud Deployment Determine Network Access Requirements Secure Networks for Cloud Interaction Manage Cloud Component Security Implement Security Technologies 6 - PLANNING IDENTITY AND ACCESS MANAGEMENT FOR CLOUD DEPLOYMENTS Determine Identity Management and Authentication Technologies Plan Account Management Policies for the Network and Systems Control Access to Cloud Objects Provision Accounts 7 - DETERMINING CPU AND MEMORY SIZING FOR CLOUD DEPLOYMENTS Determine CPU Size for Cloud Deployment Determine Memory Size for Cloud Deployment 8 - DETERMINING STORAGE REQUIREMENTS FOR CLOUD DEPLOYMENTS Determine Storage Technology Requirements Select Storage Options for Deployment Determine Storage Access and Provisioning Requirements Determine Storage Security Options 9 - ANALYZING WORKLOAD CHARACTERISTICS TO ENSURE SUCCESSFUL MIGRATION Determine the Type of Cloud Deployment to Perform Manage Virtual Machine and Container Migration Manage Network, Storage, and Data Migration 10 - MAINTAINING CLOUD SYSTEMS Patch Cloud Systems Design and Implement Automation and Orchestration for Maintenance 11 - IMPLEMENTING BACKUP, RESTORE, DISASTER RECOVERY, AND BUSINESS CONTINUITY MEASURES Back Up and Restore Cloud Data Implement Disaster Recovery Plans Implement Business Continuity Plans 12 - ANALYZING CLOUD SYSTEMS FOR PERFORMANCE Monitor Cloud Systems to Measure Performance Optimize Cloud Systems to Meet Performance Criteria 13 - ANALYZING CLOUD SYSTEMS FOR ANOMALIES AND GROWTH FORECASTING Monitor for Anomalies and Resource Needs Plan for Capacity Create Reports on Cloud System Metrics 14 - TROUBLESHOOTING DEPLOYMENT, CAPACITY, AUTOMATION, AND ORCHESTRATION ISSUES Troubleshoot Deployment Issues Troubleshoot Capacity Issues Troubleshoot Automation and Orchestration Issues 15 - TROUBLESHOOTING CONNECTIVITY ISSUES Identify Connectivity Issues Troubleshoot Connectivity Issues 16 - TROUBLESHOOTING SECURITY ISSUES Troubleshoot Identity and Access Issues Troubleshoot Attacks Troubleshoot Other Security Issues Additional course details: Nexus Humans CompTIA Cloud Plus Certification (Exam CV0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cloud Plus Certification (Exam CV0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The focus of this Windows 10 End User course is to introduce you to the Microsoft Windows 10 operating system and explain the basics of navigating the new Windows 10 operating system for becoming more productive and efficient. You'll know how to log in and learn essential functionality and review new functionality and features in Windows 10, following with review file management and customisation with File Explorer, customise and personalise desktop and other areas of the Windows 10 operating setting. You'll also learn to work with applications and programs including installing, updating, and troubleshooting, and get accustomed with Cortana, learn to use the new Maps, Mail, People, Calendar, and Weather features. Furthermore, you'll learn more about Microsoft Edge, its functionality and new features. What you'll learn Get started by logging in and navigating the Windows 10 environment. Personalize the interface and customize settings. Manage files and folders, and learn about OneDrive. Become familiar with Edge, Microsoft's newest browser, and explore the features. Learn to use Cortana, Maps, Photos, Mail, People, Calendar and Weather. Learn to install applications, set defaults, and manage updating and troubleshooting settings. Requirements Basic familiarity with computers and navigating the Internet. Who this course is for: Students who want to become familiar with the new Windows 10 environment. Introduction Intro- No Animation FREE 00:01:00 Getting Started in Windows 10 Logging In 00:02:00 The Startup Screen 00:04:00 Exploring the Desktop 00:02:00 General Navigation 00:04:00 Introducing the Action Center and Control Panel 00:02:00 Tablet Mode 00:03:00 Launching Applications 00:03:00 Interacting with Windows 00:06:00 Quitting Applications 00:04:00 Pinning Applications 00:03:00 Customizing the Start Menu 00:03:00 Customizing the Task Bar 00:02:00 Multitasking to Switch Between Multiple Applications 00:03:00 Managing several deskstops Using Task View 00:03:00 Using Cortana 00:03:00 Cortana Setup 00:03:00 File Management Overview of the drive and folder structure 00:04:00 Using Navigation Pane, Details Pane, Preview Pane 00:04:00 Menus and Ribbons 00:03:00 Viewing and Editing File Properties_Revised 00:04:00 Creating Files 00:06:00 Selecting, Moving, and Copying Files_Revised 00:06:00 Renaming Files and Folders 00:03:00 Deleting and Restoring from the Recycle Bin 00:05:00 Create and use shortcuts_Revised 00:05:00 Zip and Unzip 00:07:00 Changing the Sort and Group by 00:06:00 Add Columns to the Explorer View 00:04:00 Creating and Using a Library 00:07:00 Adding Files to a Library 00:09:00 Pin Frequent Places Customizing File Explorer 00:04:00 Configuring Files and Explore Options 00:03:00 Logging In or Setting Up OneDrive 00:02:00 Storing and acessing files on OneDrive 00:03:00 Sharing Files Through OneDrive 00:05:00 Syncing Files on OneDrive 00:03:00 Using Edge Browsing the Web 00:02:00 Customize Top Sites 00:02:00 Using Tabs 00:03:00 Organize Favorites with Folders 00:02:00 Using the Reading List and Reading View 00:03:00 Using Saving Sharing Web Notes 00:04:00 Downloading Files 00:02:00 Viewing and Clearing History 00:02:00 Using Windows Apps Maps- Search Get Directions Choose View 00:04:00 Maps- Search Tips and Favorites 00:04:00 Maps- More Search Tips and Map Settings 00:03:00 Photos - Browsing_REVISED 00:05:00 Photos - Using Editing Tools_REVISED 00:04:00 Mail- Add Accounts 00:05:00 Mail- Personalizing and Configuring 00:04:00 Mail Send a Message 00:04:00 People Search Link and Share Contacts 00:04:00 People Search Link and Share Contacts 00:04:00 Calendar Configuring and Viewing 00:04:00 Calendar Changing Views Creating and Editing Events 00:07:00 Weather Add Favorite Locations and Viewing the Weather 00:04:00 Weather- Viewing Historical Data nad Weather Maps 00:03:00 Customizing Windows 10 Managing Accounts and Sign In Options 00:03:00 Background Settings 00:04:00 Lock Screen 00:02:00 Change Windows Themes 00:02:00 Personalize Start 00:04:00 Change Screen Resolution 00:02:00 Adjust Audio Settings 00:02:00 Manage Sleep and Screen Saver 00:04:00 Change Default Storage Locations 00:02:00 Managing Devices 00:03:00 Change Type Settings 00:01:00 Adjust Mouse and Touchpad Settings 00:03:00 Adjust Autoplay Settings 00:02:00 Installing, Updating, and Troubleshooting Installing Applications from the Windows Store 00:03:00 Installing Applications From the Web 00:03:00 Setting Application Defaults 00:03:00 Setting App Privacy and Permissions 00:02:00 Uninstalling Applications 00:01:00 Configure Windows Defender and Windows Updates 00:02:00 Access Task Manage 00:02:00 Accessing the Action Center to View Messages 00:02:00 Backing Up and Restoring Files and Using Recover to Reset Your PC 00:07:00 Conclusion Course Recap 00:01:00
About this Training Course Liquefied Natural Gas (LNG) has provided intercontinental mobility to natural gas, which now provides about 25% of the global primary energy. Being the cleanest fossil fuel, natural gas/LNG consumption is forecasted to grow in all future scenarios. With the entry of various players, including Trading companies, the LNG value chain is becoming increasingly complex, and a solid understanding of its economics and management of its interfaces have become crucial to identify and assess investment opportunities and risks. Recent market disturbances caused by COVID-19, Oil & Gas price instabilities - coupled with the political (Ukraine/Russia) challenges - make a deep understanding of LNG Value Chain Logistics and Economics even more essential to ensure the security of energy supplies sustainably and profitably. This intermediate level 3 full-day course starts with a concise introduction to the LNG business. Thereafter, the elements of the LNG value chain are described, and their individual economics analysed. A Business Activity Model along the value chain will be developed and discussed in depth, covering the following key processes: 'Buy Gas - Transport Gas - Liquefy Gas - Sell LNG/Products - Ship LNG - Regasify LNG' The integrated chain economics will then be developed and quantified. A hands-on group workshop/exercise developing the economic case of a full-sized Liquefaction project will be carried out, considering the forecasted cash flows throughout the project life, the location of the plant, its markets, project sensitivities and profitability assessment. Participants will be provided with Excel based tools/models (LNG Liquefaction project development Net Present Value (NPV) analyses, Shipping Freight Calculations and Economics) to work through the exercises and also for their future personal use. Training Objectives After the completion of this course, participants will be able to: Understand how the LNG Value Chain operates, bound by the relevant Contracts and Agreements. Learn the basic economic parameters (operating, capital costs, financing, profitability) of each major element of the value chain. Appreciate the complexity of the value chain, and the associated opportunities and risks. Develop quantitative project evaluation skills. Explore options to maximise profitability in a given LNG value chain. Discuss best practices on how to manage, steer and govern these activities. Target Audience Technical, Operational, Shipping, Commercial, Project and Governance professionals who are already active in a specific section of the LNG Value Chain will directly benefit in developing a wider and deeper perspective on how the LNG Value Chain operations and can be optimised. Managers (Technical, Financial, Legal and Governance) less familiar with the specifics of the LNG Industry will also benefit from attending this VILT course, as they will obtain the required background to be able to set sharper targets, suitable performance indicators, and governance and performance assessment guidelines for units engaged in the chain. The course is most relevant for professionals engaged in the LNG industry at: National and International Oil & Gas/Energy Companies LNG Importers/Exporters/Traders/Shippers Government & Regulatory Agencies Finance Institutions It will also apply to the following audience: Business Development Managers Corporate Planning Professionals Project Developers Supply Planners & Scheduling Professionals Regulators Tax & Finance Advisors Compliance Officers Equity Analyst and Bankers Joint Venture Representatives, Board Directors Negotiators and Contracting Staff Trading Professionals Course Level Intermediate Trainer Your expert course leader is an Oil & Gas/LNG professional with more than 35 years of international experience, majority of which was gained at Shell International Joint Ventures engaged in Oil Refining, Supply / Trading, Gas Supply and LNG Businesses in the Netherlands, France, Thailand, Dominican Republic and Nigeria. Since 2004, he has had several roles in the management of the LNG Value Chain including the Commercial Operational Management of Nigeria LNG (NLNG). He played an active role in the start-up and integration of LNG trains 4, 5 and 6 with NLNG becoming the 3rd largest LNG producer in the world in 2007. Commercial operations spanned 4 Gas Supply, 11 LNG Sales & Purchase Agreements, ad-hoc LPG and Condensate Sales and LNG Ship Chartering contracts. Under his supervision, more than 2,000 LNG cargoes were exported. He was part of the organizational transformation of the company from a Project-based set-up to a Production / Commercial based structure and implemented an 'Integrated Planning and Scheduling Department' in which he optimized the value chain (Buy-Gas - Liquify Gas to LNG - Sell - Ship LNG). Staff competence management was one of his focus areas during this period. He was also the NLNG representative on JV Technical, Commercial, Shipping Committees where he interfaced with Government & Regulatory authorities. In 2014, he was appointed as Shell Shareholder representative to NLNG and became a Non-Executive Board member to NLNG companies, including Bonny Gas Transport (BGT) managing 24 LNG Ships. During this period, he was involved in the Economic and Technical steering of the Shipping Fleet and Liquefaction Plant Rejuvenation projects and a further capacity expansion of liquefaction plant which resulted in the achievement of NLNG train 7 project FID in 2019. Since 2016, he has been active as an independent consultant. He co-authored 2 patents and more than 30 published papers/presentations. He holds a PhD from Delft University of Technology in the Netherlands and a MSc and BSc in Chemical Engineering from the University of Birmingham, UK. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for While no prior programming or web development experience is required, target students should have good foundational computer skills. Overview Set up the tools and resources you need to perform Web Development. Create web pages in HTML, constructing valid, well-formed elements, including navigation links, sections, titles, and semantic markup. Enhance HTML content with tables, images, movies, and audio. Apply styles to HTML elements using CSS. Use CSS to format the edges, size, position, and layering of HTML elements. Apply complex style rules using advanced CSS selectors, including pseudo-class selectors, structural selectors, and pseudo-element selectors. Create complex layouts using CSS newspaper style columns, grid layouts, and flexible box layouts. Improve the quality of web content, including adaptability (different displays and devices), searchability, usability, and accessibility. Submit data through URL query strings and web forms for processing by a web application server. Write JavaScript code to make web pages more interactive, perform data processing tasks directly in the browser, and manipulate items in the current web page. Write JavaScript code to iterate through collections of elements in a page to get and set their attributes and add event listener code. Use third-party libraries and frameworks for web front-end development. Modern organizations depend heavily on the web to perform core business operations such as marketing, advertising, and selling products, providing services, and communicating with customers, partner organizations, and employees. Whatever you're creating on the web, HTML, CSS, and JavaScript? likely play an important role. These three languages provide the core toolkit for anyone looking to perform web development work. This course covers the fundamentals of web development using these three languages. Prerequisites This course assumes that students have strong experience working with computers. Previous experience programming in other languages is helpful, but not required for students to benefit from this course. Lesson 1: Setting Up Your Web Development Environment Topic A: Prepare Your Web Platform Topic B: Prepare Your Web Development Tools and Processes Topic C: Monitor the Web Request-Response Cycle Lesson 2: Creating Web Content in HTML Topic A: Create a Basic Web Page Topic B: Provide Navigation Links Between Web Pages Topic C: Improve Web Page Structure and Navigation Lesson 3: Adding Tables and Multimedia Content to a Web Page Topic A: Create a Table Topic B: Embed Images, Movies, and Audio in a Web Page Lesson 4: Applying Styles to Web Content Topic A: Apply Styles to HTML Topic B: Create a Style Sheet Topic C: Use Web Fonts Lesson 5: Controlling Edges, Size, and Position Topic A: Format Element Edges and Corners Topic B: Control an Element's Height and Width Topic C: Control an Element's Position and Layering Topic D: Normalize and Reset Browser CSS Defaults Lesson 6: Applying Complex Style Rules Topic A: Use Advanced Selectors Topic B: Manage User Interface States Topic C: Make Structure Apparent to Users Topic D: Use CSS Pseudo-Element Selectors Lesson 7: Creating Complex Layouts Topic A: Use CSS to Create Newspaper Style Columns Topic B: Use CSS to Create Grid Layouts Topic C: Use CSS to Create Flexible Box Layouts Lesson 8: Improving Web Content Topic A: Adjust the Layout for a Wide Variety of Devices Topic B: Perform Basic Search Engine Optimization Topic C: Test Your Website Lesson 9: Submitting Data to a Web Server for Processing Topic A: Submit Data Through a URL Topic B: Submit Data Through a Web Form Lesson 10: Writing JavaScript Code Topic A: Add JavaScript to a Web Page Topic B: Perform Operations on Data Topic C: Program Repetitive Tasks Topic D: Manipulate DOM Objects Lesson 11: Enumerating and Processing Collections of Elements Topic A: Enumerate Elements Topic B: Attach Events Through Code Lesson 12: Using Third-Party Libraries and Frameworks Topic A: Use a Third-Party JavaScript Library Topic B: Create a Web Page Based on a Third-Party Framework Additional course details: Nexus Humans Web Development with HTML5, CSS, and JavaScript (v1.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Web Development with HTML5, CSS, and JavaScript (v1.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Data has become the most important resource for every organisation – but the insights gained from data analysis will only ever be truly valuable if they can be clearly expressed to other people. This course is for anybody who works with data, and needs to communicate the meaning that's in the numbers to colleagues, customers, bosses or external stakeholders. It will give you or your team the confidence and skills to translate raw data into compelling visual stories for your key audiences. The principles and skills covered apply to the simplest PowerPoint chart, to more complex interactive visualisations. We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve. Sample learning content Session 1: What makes a great data-driven story The key elements of a successful infographic or presentation. Industry best practice, and discussion of good (and bad) examples. A simple framework for identifying the Audience, Story and Action. Session 2: Data in context How to balance function and aesthetic appeal. Identifying the right graph, chart, infographic or other visual. Framing the data and providing contextual information. Session 3: Designing for the human brain Using colours to add emphasis and meaning. Design and layout principles, and creating hierarchies of information. The principle of ‘self-sufficiency’, and removing clutter. Session 4: Navigation and narrative Tailoring visualisations for different types of communications. Structuring presentations and longer reports. Thinking in layers to create interactive dashboards. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “I was familiar with Alan’s work as a Guardian Masterclass instructor on data visualisation and digital journalism, which made it easy for me to recommend him for onsite training at the Liverpool School of Tropical Medicine. We had a large group of people interested in honing their abilities to depict their research and stories in engaging ways. Alan’s course provided great insight about common communication pitfalls and how to avoid them, how to become better communicators by understanding the audience diversity, and it showcased some great online tools for creating infographics. This should be mandatory training for all students, academics, report writers and those involved with conveying research to the media as it will help increase the clarity and accessibility of our own research stories.” Dr Lee Haines | Liverpool School of Tropical Medicine