• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2589 Courses delivered Online

Jq Command Tutorials for Bash Shell Scripting

By Packt

Expedite your journey with the Jq command, which is used to transform JSON data into a more readable format. Print it to the standard output on Linux with the help of this comprehensive hands-on course. This course is for anyone who works with JSON on the command line or uses Bash Shell Scripts.

Jq Command Tutorials for Bash Shell Scripting
Delivered Online On Demand2 hours 42 minutes
£14.99

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Copyediting & Proofreading

4.8(9)

By Skill Up

Unleash your inner editor with our comprehensive copyediting and proofreading course. Master the skills to polish your writing to perfection and become a sought-after professional.

Copyediting & Proofreading
Delivered Online On Demand7 hours 15 minutes
£13.59

Restorative Justice

By Inclusive Solutions

Restorative Interventions in Schools A “Restorative Solution” is a non-adversarial approach to conflict resolution where the person who has done something wrong in a given situation becomes accountable to those s/he has harmed. This person is then given the opportunity to “make up” for their inappropriate behaviour through agreement and reparation. An intervention can involve a formal conference, or it can be a simple conversation on a corridor or playground. Restorative Interventions work with all ages of young people, and the techniques can be used in parental meetings, can prevent exclusions and challenge poor behaviour. Our feedback tells us that when problems between young people are addressed in this way, those problems rarely reoccur. Course Category Behaviour and Relationships Teaching and Learning Description Restorative Interventions in Schools A “Restorative Solution” is a non-adversarial approach to conflict resolution where the person who has done something wrong in a given situation becomes accountable to those s/he has harmed. This person is then given the opportunity to “make up” for their inappropriate behaviour through agreement and reparation. An intervention can involve a formal conference, or it can be a simple conversation on a corridor or playground. Restorative Interventions work with all ages of young people, and the techniques can be used in parental meetings, can prevent exclusions and challenge poor behaviour. Our feedback tells us that when problems between young people are addressed in this way, those problems rarely reoccur. Also Available on line– self paced learning… give it a try! Testimonials ‘Interesting. A different approach. Another ‘weapon’ in the armoury. Will try to use.’ ‘Made me think how I can approach confrontations differently. Useful, reminded me where my focus should be and that things will be difficult at times, but that’s no excuse to stay in the comfort zone!’ ‘Excellent day. Lots of ideas to take away and use on a daily basis. Thanks.’ ‘Nice to do some work on behaviour without sanctions and restraints in mind’ Learning Objectives To introduce participants to Restorative Interventions To develop understanding of value and role in developing inclusive practice of Restorative Interventions To develop and practise Restorative Intervention skills processes Opportunity to reflect on professional practice Mutual support established with other ‘front line’ practitioners Who Is It For ? Multi Agency Teams Social workers CAMHS teams Year Managers Primary and secondary staff Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Local Authority Support Services Course Content This can be introduced in one day or as a workshop but is better offered over a series of sessions. The course answers the questions: What should we do if rewards and punishments do not work? Can we find an alternative process to recommending permanent exclusion or special unit or school placement? Struggling with a child for whom praise and sanctions seem ineffective? Want to develop a more restorative school or team? I need a process which works with relationships not just behaviour. What will work for our relationships policy? This day’s training will enable participants to facilitate Short Restorative Conferences, and will suggest ways of working with young people and others that will help to repair broken relationships, and challenge some difficult behaviour. Including all those affected by an incident in its resolution is a powerful way of producing significant improvements in behaviour. We will cover: What are restorative solutions? Background and detailed teaching of processes Inclusion values underpinning this work Processes modelled and opportunities to try process out Practical setting up of restorative conferences Stories and outcomes

Restorative Justice
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£2,500 to £6,900

AWS CloudFormation Master Class

By Packt

With this course, you will master all CloudFormation concepts, and become confident in writing CloudFormation templates using YAML. Throughout the course, you will encounter various interesting examples and activities that will help you to consolidate your learning.

AWS CloudFormation Master Class
Delivered Online On Demand3 hours 35 minutes
£29.99

23rd October Diana Beaumont #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Diana joined the prestigious DHH Literary Agency in June 2024. She started agenting with Rupert Heath Literary Agency in 2011 before moving to UTA and Marjacq in 2017. Before that she was senior commissioning editor at Transworld. Diana was chosen as one of The Bookseller’s Rising Stars of 2012, was a nominee for RNA Agent of the Year 2019, and was shortlisted for Literary Agent of the Year 2022 at the British Book Awards. Her list includes a wide range of bestselling and prize-winning authors in the UK and internationally. Diana represents adult fiction and non-fiction. For fiction, she is looking for upmarket women's commercial, with depth and heart, including reading group, historical, saga, uplit and contemporary stories that are irreverent and make her laugh; accessible literary fiction, high-concept crime fiction and thrillers. She has a thing for spy novels and would love to find a great vampire story.  On the non-fiction side: memoir, smart, funny feminists, lifestyle, cookery and social justice, and open to anything with a strong, original voice. She also encourages submissions from writers who have been traditionally under-represented. Diana would like you to submit a covering letter, 1 - 2 page synopsis and the first three chapters (a maximum of 5,000 words) of your manuscript in a single word document.  (In addition to the paid sessions, Diana is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 16th October 2025

23rd October Diana Beaumont #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Keras Deep Learning and Generative Adversarial Networks (GAN)

By Packt

Welcome to this dual-phase course. In the first segment, we delve into neural networks and deep learning. In the second, ascend to mastering Generative Adversarial Networks (GANs). No programming experience required. Begin with the fundamentals and progress to an advanced level.

Keras Deep Learning and Generative Adversarial Networks (GAN)
Delivered Online On Demand17 hours 16 minutes
£93.99

Baby & Child First Aid Video Call Class

By Mini First Aid North Nottinghamshire, Grantham & Sleaford

Award winning Baby & Child First Aid classes for parents, grandparents or anyone anyone who looks after babies and children. Delivered in a relaxed and comfortable style, designed to give you confidence to know what actions to take if faced with a medical emergency.

Baby & Child First Aid Video Call Class
Delivered Online On Demand
£20

The Complete Product Management Fundamentals

By Packt

Unlock the full potential of product management with our comprehensive course. Dive deep into product management fundamentals, Agile methodologies, and gain hands-on experience with essential project management tools, including Trello, Jira, Microsoft Teams, Planner, and ChatGPT. Elevate your career and drive success in the digital age.

The Complete Product Management Fundamentals
Delivered Online On Demand3 hours 13 minutes
£82.99

Lean Management: Just-In-Time Training and Certification

By Packt

Just-In-Time is a critical Lean tool; in fact, it is one of the two pillars of the Toyota Production system, the other one being Jidoka. The Just-In-Time (JIT) manufacturing system is a planning system for manufacturing processes that minimizes the availability of material inventories at the manufacturing site to only what, when, and how much is strictly necessary. The Just-In-Time (JIT) system is an integrated set of activities designed to achieve high-volume production using minimal inventories; raw materials, work-in-process, ?nished goods, and other consumable goods.

Lean Management: Just-In-Time Training and Certification
Delivered Online On Demand1 hour 47 minutes
£33.99