• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2419 Courses delivered Online

Selenium WebDriver 4 with Python - Zero To Hero

By Packt

This course will help you get started with automation testing of web applications. You will cover the basic and advanced topics of Selenium and Python, along with unit tests, pytest, cross-browser testing, logging infrastructure, automation framework design, Jenkins, and a lot more.

Selenium WebDriver 4 with Python - Zero To Hero
Delivered Online On Demand31 hours 8 minutes
£149.99

CompTIA IT Fundamentals ITF+ (FCO-U61) Exam Prep Course

By Packt

This video course will prepare you to take and pass the CompTIA IT Fundamentals (ITF+) certification (FC0-U61) exam confidently by helping you get to grips with all the major domains covered in the certification and enabling you to develop the skills required to set up, configure, and secure desktop PC, mobile, and networking devices.

CompTIA IT Fundamentals ITF+ (FCO-U61) Exam Prep Course
Delivered Online On Demand4 hours 54 minutes
£37.99

Introduction Perl Programming Essentials (TT4925)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files

Introduction Perl Programming Essentials (TT4925)
Delivered OnlineFlexible Dates
Price on Enquiry

European Data Protection & Privacy Programme Management - DPO Ready

By Training Centre

  European Data Protection   Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.   The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management   Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry.   The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle.  About This Course   Delivered in a modular format, this four day course covers   Days 1 & 2   Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework.  Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories.  Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors.  Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities.  Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor.  Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches.  Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer.  Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations.  Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance.  Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing.    Days 3 & 4   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management.  Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks.  Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy.  Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments.  Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation.  Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten.  Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs.  Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design.  Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach.  Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included?   1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

European Data Protection & Privacy Programme Management - DPO Ready
Delivered OnlineFlexible Dates
£2,750

The Complete Blazor Bootcamp - .NET 6 (WASM and Server)

By Packt

This course will walk you through a whole real-world scenario for developing and deploying an ecommerce website with Blazor, and we will tackle numerous obstacles along the way. You will learn how to create a .NET 6 API from scratch and deploy .NET API, Blazor WASM, and Server to Azure in this course.

The Complete Blazor Bootcamp - .NET 6 (WASM and Server)
Delivered Online On Demand15 hours 47 minutes
£41.99

Electrical Machines for Electrical Engineering

5.0(10)

By Apex Learning

Overview This comprehensive course on Electrical Machines for Electrical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Electrical Machines for Electrical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Electrical Machines for Electrical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Electrical Machines for Electrical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 8 sections • 108 lectures • 14:20:00 total length •Module 1- Introduction to Electric Machines: 00:03:00 •Module 2- Types of Electric Machines and Principle of Electrical Generation: 00:09:00 •Module 1- Importance and Construction of DC Machines: 00:26:00 •Module 2- Armature Winding and EMF Equation: 00:40:00 •Module 3-Solved Example 1: 00:05:00 •Module 4-Solved Example 2: 00:04:00 •Module 5-Solved Example 3: 00:07:00 •Module 6-Solved Example 4: 00:06:00 •Module 7-Separately Excited DC Machine: 00:21:00 •Module 8-Shunt and Series DC Machines: 00:25:00 •Module 9-Solved Example 1 on Separately Excited DC Machine: 00:07:00 •Module 10-Solved Example 2 on Separately Excited DC Machine: 00:07:00 •Module 11-Solved Example 3 on Shunt Generator: 00:04:00 •Module 12-Solved Example 4 on Shunt Generator: 00:07:00 •Module 13-Solved Example 5 on Series DC Generator: 00:06:00 •Module 14-Types and Applications of Compound DC Motors: 00:07:00 •Module 15- Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor: 00:33:00 •Module 16- Torque-Speed Characteristics of Series DC Motor: 00:08:00 •Module 17-Solved Example 1 on Speed Control: 00:08:00 •Module 18-Solved Example 2 on Speed Control: 00:06:00 •Module 19- Starting of DC Machine: 00:14:00 •Module 20- Armature Reaction in DC Machines: 00:10:00 •Module 21-Losses in DC Machines: 00:04:00 •Module 1- What is a Transformer: 00:02:00 •Module 2- Importance of Transformer: 00:04:00 •Module 3-Iron Core of Transformer: 00:04:00 •Module 4- Magnetic Circuit Inside Transformer: 00:05:00 •Module 5- Windings of Transformer: 00:03:00 •Module 6- Why are Windings Made of Copper: 00:01:00 •Module 7- Classification of Windings: 00:05:00 •Module 8- Insulating Material and Transformer Oil: 00:02:00 •Module 9- Conservator of Transformer: 00:03:00 •Module 10- Breather of Transformer: 00:04:00 •Module 11- Bushings of Transformer: 00:04:00 •Module 12- Tap Changer of Transformer: 00:03:00 •Module 13- Cooling Tubes of Transformer: 00:01:00 •Module 14- Buchholz Relay of Transformer: 00:02:00 •Module 15- Explosion Vent: 00:02:00 •Module 16- Methods of Cooling: 00:03:00 •Module 17-Types of Transformers: 00:03:00 •Module 18- Power Transformer and Distribution Transformer: 00:05:00 •Module 19- Single Phase Core Type Transformer: 00:04:00 •Module 20-Single Phase Shell Type Transformer: 00:05:00 •Module 21- 3 Phase Core Type: 00:02:00 •Module 22- 3 Phase Shell Type: 00:01:00 •Module 23- Comparison between Shell and Core CSA: 00:01:00 •Module 24- Comparison between Shell and Core Type: 00:01:00 •Module 25- Notes: 00:03:00 •Module 26-Video Explaining The Components in 3D and Real Life: 00:05:00 •Module 1- Introduction to Magnetic Circuits: 00:02:00 •Module 2- Induced Emf and Current: 00:04:00 •Module 3- Ampere Right Hand Rule: 00:04:00 •Module 4- Magnetic Circuit and Important Definitions: 00:06:00 •Module 5- Linear and Non Linear Materials: 00:03:00 •Module 6-Flux Linkage and Reluctance: 00:04:00 •Module 7- Analogy between Electric and Magnetic Circuits: 00:06:00 •Module 8- Fringing Effect: 00:02:00 •Module 9- Example 1 Magnetic Circuits: 00:07:00 •Module 10- Example 2: 00:03:00 •Module 11- Example 3: 00:06:00 •Module 12- Application on Magnetic Circuit - Transformers: 00:04:00 •Module 1- Introduction to Transformers: 00:02:00 •Module 2- Construction of Transformer: 00:02:00 •Module 3-Theory of Operation: 00:04:00 •Module 4- Ideal Transformer: 00:05:00 •Module 5-Non Ideal Transformer: 00:02:00 •Module 6- Effect of Loading on Transformer: 00:03:00 •Module 7- Transformer Regulation: 00:03:00 •Module 8- Transformer Losses: 00:03:00 •Module 9- Transformer Efficiency: 00:05:00 •Module 10- Transformer Rating: 00:02:00 •Module 11- Question 1: 00:01:00 •Module 12- Question 2: 00:02:00 •Module 13- Question 3: 00:01:00 •Module 14- Example 1: 00:01:00 •Module 15- Voltage Relation of Transformer: 00:04:00 •Module 16- Transformer Exact Equivalent Circuit: 00:06:00 •Module 17- Concept of Refereeing: 00:04:00 •Module 18- Approximate Equivalent Circuit: 00:02:00 •Module 1- Construction and Principle of Operation of Synchronous Generator: 00:29:00 •Module 2- Principle of Operation of Synchronous Motor: 00:24:00 •Module 3- Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine: 00:29:00 •Module 4-Solved Example 1 on Non Salient Machine: 00:05:00 •Module 5-Solved Example 2 on Non Salient Machine: 00:11:00 •Module 6-Solved Example 3 on Non Salient Machine: 00:07:00 •Module 7- Solved Example 4 on Non Salient Machine: 00:04:00 •Module 8-Solved Example 5 on Non Salient Machine: 00:07:00 •Module 9-Solved Example 6 on Non Salient Machine: 00:03:00 •Module 10- Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine: 00:39:00 •Module 11-Solved Example 1 on Salient Machine: 00:09:00 •Module 12- Solved Example 2 on Salient Machine: 00:05:00 •Module 13-Solved Example 3 on Salient Machine: 00:10:00 •Module 14- Parallel Operation of Two Generators: 00:17:00 •Module 15- Synchronization of Machine with Grid: 00:10:00 •Module 1- Construction and Theory of Operation of Induction Machines: 00:27:00 •Module 2- Equivalent Circuit and Power Flow in Induction Motor: 00:23:00 •Module 3- Torque-Speed Characteristics of Induction Motor: 00:20:00 •Module 4- Solved Example 1 on Induction Motor: 00:08:00 •Module 5-Solved Example 2 on Induction Motor: 00:06:00 •Module 6-Solved Example 3 on Induction Motor: 00:06:00 •Module 7-Solved Example 4 on Induction Motor: 00:18:00 •Module 8-Solved Example 5 on Induction Motor: 00:13:00 •Module 9- Methods of Speed Control of Induction Motor: 00:27:00 •Module 10- Methods of Starting of Induction Motor: 00:21:00 •Module 11-Solved Example on Motor Starter: 00:15:00 •Module 12- Principle of Operation of Doubly Fed Induction Generator: 00:11:00 •Module 13-Self Excited Induction Generator: 00:08:00 •Assignment - Electrical Machines for Electrical Engineering: 00:00:00

Electrical Machines for Electrical Engineering
Delivered Online On Demand14 hours 20 minutes
£12

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

LEADERSHIP FOR INCLUSION

By Inclusive Solutions

In this lively interactive workshop we will explore the challenges faced by leaders of schools when tackling inclusion issues. We develop the concept of the leader as being central to the web of an organisation and the web of inclusion. Information flows freely to and from the leaders and interconnections are a premium. We explore shared leadership and consensus building using the Native American ‘Medicine Wheel’ to guide and structure our management of change. Course Category Inclusion Description In this lively interactive workshop we will explore the challenges faced by leaders of schools when tackling inclusion issues. We develop the concept of the leader as being central to the web of an organisation and the web of inclusion. Information flows freely to and from the leaders and interconnections are a premium. We explore shared leadership and consensus building using the Native American ‘Medicine Wheel’ to guide and structure our management of change. Testimonials ‘Inclusive practice has become more daring, more radical, more inspirational, more inclusive. How exciting and encouraging!’ ‘What a moving and energising day – there is so much we can do together’ Learning Objectives Increased confidence regarding developing leadership for inclusive practice in mainstream schools Access to a wider range of practical strategies to impact on team building Deeper understanding of developing vision and consensus Opportunity to reflect on professional attitudes and behaviour towards staff, parents and pupils New skills and processes to make inclusion successful Who Is It For? Heads and Deputies Leaders Managers of Chidren’s Centres Managers of Early Years settings Local Authority Support Services Course Content The course answers the questions: How to get a team thinking and working more inclusively? How to create and share my vision? Where do I start to think about developing a more inclusive setting? How can I get the best out of my team? We will cover a range of areas including: Establishing a welcoming team Building Vision and values Developing Trust Creating inclusive staff teams and communities of acceptance Creative Team problem solving Organisational models Curriculum access and curriculum design for inclusion Work with parents Consensus building If you liked this course you may well like: LEADERSHIP: CREATING AND SHARING YOUR VISION

LEADERSHIP FOR INCLUSION
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Learning R Programming for Data Science

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Data Science Overview Introduction to Data Science 00:01:00 Data Science: Career of the Future 00:04:00 What is Data Science. 00:02:00 Data Science as a Process 00:02:00 Data Science Toolbox 00:03:00 Data Science Process Explained 00:05:00 What's Next 00:01:00 R and RStudio Engine and Coding Environment 00:03:00 Installing R and RStudio 00:04:00 RStudio: A Quick Tour 00:04:00 Introduction to Basics Arithmetic With R 00:03:00 Variable Assignment 00:04:00 Basic data types in R 00:03:00 Vectors Creating a Vector 00:05:00 Naming a Vector 00:04:00 Arithmetic Calculations On Vectors 00:07:00 Vector selection 00:06:00 Selection By Comparison 00:04:00 Matrices What's a Matrix 00:02:00 Analyzing Matrices 00:03:00 Naming a Matrix 00:05:00 Adding Columns and Rows To a Matrix 00:06:00 Selection of Matrix Elements 00:03:00 Arithmetic with Matrices 00:07:00 Factors What is Factor 00:02:00 Categorical Variables and Factor Levels 00:04:00 Summarizing a Factor 00:01:00 Ordered Factors 00:05:00 Data Frames What's a Data Frame 00:03:00 Creating a Data Frame 00:04:00 Selection of Data Frame elements 00:03:00 Conditional selection 00:03:00 Sorting a Data Frame 00:03:00 Lists Why Would You Need Lists 00:01:00 Creating Lists 00:03:00 Selecting Elements From a List 00:03:00 Adding more data to the list 00:02:00 Relational Operators Equality 00:03:00 Greater and Less Than 00:03:00 Compare Vectors 00:03:00 Compare Matrices 00:02:00 Logical Operators AND, OR, NOT Operators 00:04:00 Logical Operators with Vectors and Matrices 00:04:00 Reverse the result: (!) 00:01:00 Relational and Logical Operators Together 00:06:00 Conditional Statements The IF Statement 00:04:00 IF…ELSE 00:03:00 The ELSEIF Statement 00:05:00 Full Exercise 00:03:00 Loops Write a While Loop 00:04:00 Looping With More Conditions 00:04:00 Break: Stop the While Loop 00:04:00 What's a For Loop 00:02:00 Loop Over a Vector 00:02:00 Loop Over a List 00:03:00 Loop Over a Matrix 00:03:00 For Loop With Conditionals 00:01:00 Using Next and Break With For Loop 00:03:00 Functions What is Function 00:02:00 Arguments Matching 00:03:00 Required and Optional Arguments 00:03:00 Nested functions 00:02:00 Writing Own Functions 00:03:00 Functions With No Arguments 00:02:00 Defining Default Arguments In Functions 00:04:00 Function Scoping 00:02:00 Control Flow in Functions 00:03:00 R Packages Installing R Packages 00:01:00 Loading R Packages 00:04:00 Different Ways To Load a Package 00:02:00 The Apply Family - Lapply What Is Lapply and When Is Used. 00:04:00 Use Lapply With User-Defined Functions 00:03:00 Lapply and Anonymous Functions 00:01:00 Use lapply With Additional Arguments 00:04:00 The Apply Family - Sapply & Vapply What is Sapply 00:02:00 How to Use Sapply 00:02:00 Sapply With Your Own Function 00:02:00 Sapply With a Function Returning a Vector 00:02:00 When Can't sapply Simplify. 00:02:00 What is Vapply and Why is it Used. 00:04:00 Useful Functions Mathematical Functions 00:05:00 Data Utilities 00:08:00 Regular Expressions Grepl & Grep 00:04:00 Metacharacters 00:05:00 Sub & Gsub 00:02:00 More Metacharacters 00:04:00 Dates And Times Today and Now 00:02:00 Create and Format Dates 00:06:00 Create and Format Times 00:03:00 Calculations with Dates 00:03:00 Calculations with Times 00:07:00 Getting and Cleaning Data Get and Set Current Directory 00:04:00 Get Data From the Web 00:04:00 Loading Flat Files 00:05:00 Loading Excel files 00:03:00 Plotting Data in R Base Plotting System 00:03:00 Base plots: Histograms 00:03:00 Base plots: Scatterplots 00:05:00 Base plots: Regression Line 00:03:00 Base plots: Boxplot 00:03:00 Data Manipulation With dplyr Introduction to Dplyr Package 00:04:00 Using the Pipe Operator (%>%) 00:02:00 Columns component: select() 00:05:00 Columns component: rename() and rename_with() 00:02:00 Columns Component: Mutate() 00:02:00 Columns Ccomponent: Relocate() 00:02:00 Rows Component: Filter() 00:01:00 Rows Component: Slice() 00:04:00 Rows Component: Arrange() 00:01:00 Rows Component: Rowwise() 00:02:00 Grouping of Rows: Summarise() 00:03:00 Grouping of Rows: Across() 00:02:00 COVID-19 Analysis Task 00:08:00 Supplementary Resources Supplementary Resources - Learning R Programming for Data Science 00:00:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Learning R Programming for Data Science
Delivered Online On Demand
£19