LOOKING FOR: PB, CHAPTER BOOKS, MG, GRAPHIC NOVELS, CHILDREN'S NON-FICTION Millie van Grutten joined Caroline Sheldon Literary Agency in 2021 and as of early 2024 Caroline Sheldon Literary Agency was acquired by Rogers Coleridge & White. Millie is thrilled to be building the children’s illustrated division at RCW and is actively looking for authors and illustrators of picture books, chapter books, young fiction, graphic novels and is particularly interested in children’s non-fiction presented in any guise. Millie loves working collaboratively with authors and illustrators whether it’s brainstorming a title, building a portfolio, trying out new genres and age groups or simply chatting ideas through. She relishes the opportunity to champion the work of illustrators and authors alike and is open to anything from 0-9 whether texts, illustrations or both. She loves anything with strong and engaging characters at its heart, quirky stories, and books that make you laugh and/or books that can make you laugh while you learn… Apart from the ever enduring and absolute classics like Quentin Blake’s Mrs Armitage, Millie has recently enjoyed Mariajo Ilustrajo’s Lost, Ed Vere’s The Artist, The Secret Beast Club (Robin Birch and Jobe Anderson), Dave Pigeon (Swapna Haddow and Sheena Dempsey), How to Be A Genius Kid (Jim Smith) and anything by Lauren Child. Among many other talents, Millie represents Swapna Haddow, Zehra Hicks, Sandra Dieckmann, Jobe Anderson, Marilyn Esther Chi, Emma Clarke, Jim Smith, Gabriella Szendrey, Helen and Thomas Docherty. Millie would like you to submit a covering letter, 1 page synopsis and the opening three chapters (max 5,000 words) of your novel. For picture books please send up to three texts split into 12 spreads each and a covering letter. For non-fiction please supply a cover letter and proposal with up to 5,000 words of your sample text. Please send EITHER picture books OR another genre, not both in one submission. (In addition to the paid sessions, Millie is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). Submission Deadline: Wednesday 20 November 2024
Dyslexia and Working Memory Join me for my most POPULAR Masterclass where we talk all things working memory and dyslexia! About this event Thanks to International Dyslexia Learning Solutions for sponsoring this webinar. Head to their website today to find out how they can support your child/students: Click Here Welcome to my most popular webinar talking all things Working Memory! If you are a parent and or educator and continuously worry about your child's working memory ability, then this session is for you. With over 25 years of special educational needs experience, I am the GO TO expert who will be able to offer you a wide range of tips, strategies and advice when it comes to supporting students/your child who has a weak working memory. In this LIVE event, I will be covering the following: 1. What is working memory? 2. What to look out for if you suspect your child/student has a weak working memory. 3. Strategies to support working memory. 4. Time for Live Q and A with me. Outcomes of this webinar will be: 1. You will have a much better understanding of Working Memory. 2. Understand the impact this has with the school system for those kids who have a weak working memory. 3. How to recognise your child/students are showing signs of a weak working memory. 4. Be ARMED with strategies and tips that can help SUPPORT your child/students in order to make life more manageable for them. 5. Feel more confident about Working memory! My name is Paloma Forde, the founder of Dyslexia Support Services. I am an educator, consultant, author and an international speaker. I have working in the field of SEN for 27 years and have worked across all Key Stages in the education sector. My whole passion now is to pass on my knowledge to others in the hope that we can together make an inclusive world for those children/students who continually struggle in the education system. Did you know that around 45% of students with dyslexia will often have a weak working memory? This means that they are likely to be overloaded in class and miss out on large chunks of learning. Please note that this is a LIVE event via Zoom. This will be recorded if you cannot attend in person. If you want to know more about working memory and or want the right outcome for your child/students who have a weak working memory, then this webinar is for YOU. I look forward to being able to support you in your journey. Any questions just ask away or email me at screen4dyslexia@gmail.com See you soon! Thanks for reading. Paloma Forde - Founder of Dyslexia Support Services. The GO TO Dyslexia Screening Expert Please note that by signing up to my webinar, you will automatically be added to my mailing list. You can unsubscribe at anytime. Tickets are non-refundable.
LOOKING FOR: PICTURE BOOKS, MG, YA, ADULT FICTION Molly Jamieson has been working at United Agents Ltd since 2017, working across adult and children’s books, and before that she worked at Curtis Brown. She has recently started building her own client list which already includes million-copy selling authors and bestsellers. Molly has a particular interest in scifi and fantasy across both adult and children’s books. For a sense of her taste, she has recently read and enjoyed Sistersong by Lucy Holland, Gideon the Ninth by Tamsyn Muir, Uprooted by Naomi Novik, The Poppy War by R.F. Kuang, and Once Upon A Broken Heart by Stephanie Garber. She loves anything with high stakes, characters you would follow anywhere, big stories, expansive worldbuilding, breathless romance, and threads of adventure running throughout. She is also looking for commercial romantic fiction in all shapes and forms. She has a real soft spot for classic tropes, a great sense of humour, and anything with a clear pitch that makes you sit up and take notice, but in the end it all comes down to chemistry. In this area, she has recently read and loved The Hating Game by Sally Thorne, Book Lovers by Emily Henry, The Unhoneymooners by Christina Lauren, and The Love Hypothesis by Ali Hazelwood. She also represents children’s authors and illustrators in all genres, from picture books up to YA. In one single word document, Molly would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document, whichever is shorter. For picture books, please submit a covering letter and 2 picture books in a single document. Please send EITHER picture books OR another genre, not both in one submission. (In addition to the paid sessions, Molly is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 18 November 2024.
Course Overview The Become an Author Level 2 course is designed to provide you with the tools and skills to become a successful author and publish your first book online. It covers everything you need to know to set yourself up as a professional writer, from planning and structuring your writing, to understanding the format of a Kindle book. Through this step-by-step guide, you will learn about the key principles of writing and how to get into the mindset of an author. It provides tips and advice on how and where to edit your work, which will give you a head start in your career and earn a steady income solely through writing alone. By the end of this course, you will have the knowledge you need to write and self-publish your first book, with an in-depth understanding of the art of authorship. This best selling Become an Author Level 2 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Become an Author Level 2 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Become an Author Level 2 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Become an Author Level 2 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Become an Author Level 2, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Become an Author Level 2 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Become an Author Level 2 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
LOOKING FOR: PICTURE BOOKS, CHAPTER BOOKS, MG, YA Lil is an editor with over 15 years experience in the publishing industry. She’s currently freelancing and is in direct contact with many of the big publishing houses: Hachette, Bonnier Books, and book packager, Working Partners Ltd, among others. She also works with the Caroline Wakeman Literary Agency, assessing their authors’ work for commercial viability, as well as scouting for new talent. For twelve years, Lil was a Senior Commissioning Editor at Working Partners Ltd – the creatives behind massive commercial hits such as Beast Quest, Warriors and the Daisy Meadows series. There she created globally successful concepts for every age group and developed storylines so the books were unputdownable. Lil is also an author in her own right: she has written 6 books under her own name, and ghost written many others under various pseudonyms. In every age level, Lil would like to see originality - particularly in voice. A strong character with depth, venturing on a quest that's never been undertaken before will get her excited. The 'quest' doesn't have to be epic in scale, it could be as small as petting the next-door neighbour's dog, or getting the good looking new kid to notice you, it just has to be something a reader will want to invest in. She also loves humour and is happy to see anything quirky (perhaps even downright silly!). For picture books, Lil would like you to submit a covering letter, and 1 complete manuscript, double-spaced, with spreads marked out, in a single word or PDF doc. For chapter books, MG and YA, please send a covering letter, the first three chapters and a synopsis, double spaced, in a single Word or PDF doc. Please send EITHER picture books OR another genre, not both in one submission. By booking this session you agree to email your material to reach I Am In Print by the stated submission deadline to agent121@iaminprint.co.uk. Please note that I Am In Print take no responsibility for the advice given in your Agent121. The submission deadline is: Monday 25 November 2024
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET