An Introduction to British and American Literature is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this An Introduction to British and American Literature and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 11 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Elizabethan Drama and Shakespeare's Hamlet The History of Drama 00:10:00 Elizabethan Drama 00:12:00 William Shakespeare 00:06:00 Hamlet: A Synopsis of the Play 00:04:00 Hamlet: An Anlaysis of the Play 00:19:00 Hamlet's Soliloquies 00:05:00 Jacobean Literature and the Metaphysical Poets Jacobean Literature Poetry and Prose 00:12:00 Puritanism & The English Civil War 00:11:00 Metaphysical Poetry 00:08:00 George Herbert 00:05:00 Andrew Marvell 00:07:00 John Milton 00:08:00 The Rise of the Novel and Satire The Restoration & Glorious Revolution 00:06:00 The Novel 00:08:00 Early Novelists: Defoe, Richardson, and Fielding 00:11:00 English Satire: John Dryden & Alexander Pope 00:06:00 Jonathan Swift & Gulliver's Travels 00:10:00 Swift's A Modest Proposal 00:08:00 The Emergence of American Literature Colonialism & John Smith 00:07:00 Pilgrim Writers 00:10:00 The Revolutionary Period Writers 00:07:00 The Knickerbocker Era: Washington Irving 00:14:00 Frontier Fiction: James Fenimore Cooper 00:10:00 The New England Renaissance The Westward Expansion 00:04:00 Transcendentalism: Ralph Waldo Emerson 00:10:00 Transcendentalism: Henry David Thoreau 00:08:00 Anti-Transcendentalism: Nathaniel Hawthorne 00:05:00 Nathaniel Hawthorne and The Scarlet Letter 00:08:00 Herman Melville 00:05:00 Edgar Allan Poe 00:06:00 Poe's 'The Cask of Amontillado' 00:05:00 Poe's 'The Raven' 00:07:00 The American Civil War Era and the Gilded Age The American Civil War Era & Harriet Beecher Stowe 00:07:00 Walt Whitman 00:09:00 Whitman's 'Drum Taps' 00:06:00 Emily Dickinson 00:09:00 The Gilded Age 00:07:00 Local Color Writing: Mark Twain 00:08:00 Tom Sawyer & Huck Finn 00:11:00 A Connecticut Yankee in King Arthur's Court 00:07:00 Women Writers of the 19th Century Female Writers & The French Revolution 00:12:00 Mary Wollstonecraft 00:09:00 Helen Maria Williams 00:08:00 Unitarianism 00:04:00 Harriet Martineau 00:12:00 Anna Laetitia Barbauld 00:06:00 Lucy Aikin 00:05:00 British Romantic Poets and the Poetic Imagination The Napoleonic Wars 00:08:00 The Romantic Period 00:05:00 William Blake 00:08:00 William Wordsworth 00:08:00 Samuel Taylor Coleridge 00:08:00 Percy Bysshe Shelley 00:08:00 John Keats 00:09:00 Lord George Gordon Byron 00:07:00 Victorian Novels Gothic Novels 00:10:00 Jane Austin's Pride and Prejudice 00:14:00 Victorian Novels 00:09:00 Emily Brontë and Wuthering Heights 00:11:00 Charles Dickens and Great Expectations 00:15:00 The Imagist Movements after World War I Anti-Victorianism & Edwardian England 00:05:00 Imagism & Gertruid Stein 00:05:00 Post War Literature & Ezra Pound 00:10:00 T.S. Eliot 00:13:00 William Carlos Williams 00:05:00 Archibald MacLeish 00:05:00 Modernist Fiction Modernist Fiction 00:07:00 Henry James 00:07:00 James Joyce 00:07:00 Joyce's 'Araby' 00:19:00 Joyce's Ulysses 00:07:00 Virginia Woolf 00:06:00 To the Lighthouse 00:12:00 The Lost Generation Ernest Hemingway and the Lost Generation 00:05:00 Hemingway's The Sun Also Rises 00:10:00 F. Scott Fitzgerald 00:04:00 Fitzgerald's The Great Gatsby 00:08:00 ee cummings 00:06:00 Robert Lowell 00:05:00 The Beat Generation & Allen Ginsberg 00:11:00
Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success
Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment
Earned Value Management: In-House Training: In-House Training Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. EVM provides a solid platform for risk identification, corrective actions, and management re-planning as may be required over the life of a project or program. The course emphasis is on the latest EVM principles and concepts in accordance with changes and guidelines for Earned Value Management in The Guide to the Project Management Body of Knowledge (PMBOK® Guide) and The Practice Standard for Earned Value Management published by the Project Management Institute. What you Will Learn You'll learn how to: Develop a project baseline, using an effective WBS Record actual project performance Calculate EVM measures Evaluate project performance based on EVM measures Respond to project variances Integrate EVM and risk management Determine how EVM will add value to your organization Develop an EVM implementation plan for your organization Getting Started Introductions Course structure Course goals and objectives Expectations Foundation Concepts Introduction to Earned Value Management (EVM) Benefits of EVM EVM Process Overview Applications of EVM Creating a Work Breakdown Structure Reviewing WBS concepts Reviewing WBS development process (decomposition) Using a WBS to support EVM Building a Project Baseline Defining a project baseline Developing a project baseline Using a project baseline Recording Actuals Recording actuals overview Collecting data for actual project performance Determining earned value - various methods EVM Performance Measures Using current status measures Using forecasting measures Analyzing EVM measures EVM and Risk Management Integrating EVM and Risk Management Using EVM measures in the risk register Exploring how EVM can facilitate reserves management Drawing down contingency reserves Responding to Variances Introduction to variances Process for responding to variances Response options Reporting Project Performance EVM reporting overview Meeting EVM reporting needs Addressing EVM reporting challenges Implementing an EVMS Defining EVMS requirements EVM for Agile projects Tailoring the EVMS Summary and Next Steps Review of content Review of objectives / expectations Personal action plan
LTE Backhaul training course description This course provides a concise insight into the LTE backhaul. Key parts of the course are detailed looks at the transport of messages and the S1 and X2 protocols. What will you learn Describe the overall architecture of LTE. Explain how data and signalling messages are transported in LTE. Describe the S1 protocol. Describe the X2 protocol. LTE Backhaul training course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 2 days LTE Backhaul training course contents Introduction In the first section of the course, we review LTE and its hardware and software architecture. Requirements and key features of LTE. LTE Architecture and capabilities of the UE. Architecture of the E-UTRAN, functions of the eNB. EPC architecture, and functions of the MME, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM and RRC state diagrams. Architecture of the radio access network In this section, we look in more detail at the architecture of the evolved UMTS terrestrial radio access network (E-UTRAN). Logical and physical architecture of the E-UTRAN. Numbering, addressing and identification. E-UTRAN functions. E-UTRAN protocol stacks. Timing and frequency synchronisation in LTE. Transport of data and signalling in LTE Here, we look in more detail at the techniques and protocols that are used to transport data and signalling messages across the evolved UMTS terrestrial radio access network and the evolved packet core. Quality of service in LTE. The GPRS tunnelling protocol. Differentiated services Multi-protocol label switching (MPLS). The stream control transmission protocol (SCTP). The S1 application protocol This section gives a detailed account of the signalling procedures in the S1 application protocol, which the MME uses to control the operation of the eNB. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. S1 setup procedure. UE context management procedures. Non access stratum information transport. Procedures for managing the evolved radio access bearer (E-RAB). Paging procedures. Mobility management procedures for S1-based handovers. Procedures in support of self-optimising networks. The X2 application protocol This section gives a detailed account of the signalling procedures in the X2 application protocol, which is used for peer-to-peer communication between eNBs. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. X2 setup procedure. Mobility management procedures for X2-based handovers Procedures in support of self-optimising networks. High level system operation In the final section, we bring our discussions of the S1 and X2 application protocols together by reviewing the system-level operation of LTE. Attach procedure. Transitions between the states of RRC Idle and RRC Connected. Tracking area updates in RRC Idle. Handover procedures in RRC Connected.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
Learn about Bloodstain Pattern Analysis (BPA) and develop the skills to identify bloodstains and interpret bloodstain patterns, over the course of 3 MODULES, from renowned experts in the field. Brought to you by SPATTER/ED Ltd.
Advanced UNIX shell scripting training course description A follow on hands on course from the Introduction to shell programming course covering the powerful sed and awk tools along with the extra Korn shell programming features. What will you learn Use regular expressions within grep, ed and many other utilities. Use awk and sed. Integrate sed and awk into shell scripts. Recognise the role of shell scripts within the UNIX system. Write shell scripts using new Korn shell features including: The select construct Arrays Arithmetic evaluation Advanced UNIX shell scripting training course details Who will benefit: Programmers developing applications under UNIX. Administrators who need time saving utilities. Technical personnel who wish to make the most out of the Korn Shell. Prerequisites: UNIX shell scripting Duration 3 days Advanced UNIX shell scripting training course contents Regular Expressions What are REs? How can they be used? How to write REs More REs e REs Tagging, matching words, repetitions. The sed editor Basic usage: Saving output, options. sed script files, sed commands, Specifying lines to edit, Hold space and pattern space, advanced commands Awk Basic usage, nawk script files, Patterns, Records and fields, Actions if, while, do, for... System variables NF, NR, RS... Arrays Functions length, printf, cos, user defined... Using nawk in shell scripts Korn shell scripts Review of Bourne shell scripts functions... Variables typeset, manipulating strings Arrays Arithmetic evaluation the let command, (( )), typeset -i The select construct Syntax, workings, REPLY, PS3 Miscellaneous Enhanced I/O, ${10}
Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.
Description: This An Introduction to PCs Using Windows 8 - Video Training Course has been designed to help you understand what an operating system is and how it helps you to interact with the hardware. You will get an overview of PCs and the Windows 8 interface, using modern apps and navigation tools which coherently works with desktop applications. Firstly, in this course, you will learn about the different devices that are available in a PC; input, output, storage devices, etc. Windows 8 is an updated OS version from Microsoft which incorporates a lot of new and exciting features and interface. This course will provide you a guideline on using the navigation features and desktop applications. You will also be introduced with the refurbished Internet Explorer 10. Customizing Windows 8 environment to suit your needs is also possible. Overall, including the security features, this course will prepare you for the professional field. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? An Introduction to PCs Using Windows 8 - Video Training Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our An Introduction to PCs Using Windows 8 - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Getting to Know PCs and the Windows 8 User Interface Identify Components of a Personal Computer IPU FREE 00:08:00 Sign In to Windows 8 00:07:00 Signing In to Windows 8 and Managing Tiles 00:08:00 Navigate the Start Screen 00:18:00 Using the Account ID Menu 00:02:00 Using Modern Apps and Navigation Features Access and Identify the Charms 00:03:00 Viewing the Charms 00:02:00 Modern Apps and Common Navigation Features 00:03:00 Navigating a Modern App 00:07:00 Multitasking with Apps 00:05:00 Working with Multiple Apps 00:05:00 Working with Desktop Applications Navigate the Desktop IPU 00:07:00 Navigating The desktop 00:07:00 Manage Files and Folders with File Explorer IPU 00:09:00 Managing Files and Folders 00:15:00 Elements of a Desktop Window 00:12:00 Working with the Elements of a Desktop Window 00:10:00 Creating and Modifying Files with Wordpad 00:14:00 Printing a Document 00:05:00 Using Internet Explorer 10 Navigate Internet Explorer 10 00:08:00 Navigating Internet Explorer 10 00:09:00 Browse the Web 00:12:00 Using Internet Explorer and Share 00:08:00 Customizing the Windows 8 Environment Customize the Start Screen 00:07:00 Creating Groups on the Start Screen 00:02:00 Changing PC Setting 00:07:00 Customize the Desktop IPU 00:08:00 Personalizing the Desktop 00:11:00 Using Windows 8 Security Features Set Privacy Levels and Passwords 00:05:00 Changing Your Password 00:05:00 Use Windows Defender IPU 00:05:00 Changing Windows Defender Settings 00:05:00 Store and Share Files with SkyDrive 00:03:00 Mock Exam Mock Exam- An Introduction to PCs Using Windows 8 - Video Training Course 00:20:00 Final Exam Final Exam- An Introduction to PCs Using Windows 8 - Video Training Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00