Enhance cloud security expertise with specialized training, bridge skill gaps for job growth, and excel in cloud controls and best practices. This course is delivered online by Sean Hanna, three time EC-Council global trainer of the year award winner.
This course accompanies your Practitioner diploma in clinical hypnotherapy, its a practical Hypnotherapy Training course: It's 5-Days of immersive practice. Dive into the practical implementation of clinical hypnotherapy with 5 intensive days of training. These training days are designed to equip you with essential hands-on skills for immediate application. These training days invite you to experience and practice with guidance the tools and techniques taught in the first 5 modules of the practitioner diploma in clinical hypnotherapy. Across these training days, you will actively learn to: * Induce Hypnosis & Build Rapport: Master various hypnotic inductions and communication techniques to effectively guide clients into a trance state. * Implement Suggestion & Regression Therapy: Gain practical experience in crafting and delivering powerful suggestion therapy, along with exploring regression techniques to address root causes of challenges. * Apply Advanced Language Patterns: Develop and refine your use of hypnotic language for effective client consultations, rapid transformation, and facilitating positive behavior and state changes. * Address Specific Client Needs: Learn practical methods for rapid phobia release, managing anxiety, overcoming fears, and applying solution-focused techniques to help clients achieve their desired outcomes. * Prepare for Practice: Begin to understand the fundamentals of setting up and developing your own clinical hypnotherapy practice, preparing you for real-world application. This immersive training emphasises hands-on practice, ensuring you gain the confidence and capability it accompanies the accademic part of your self directed learning to begin your journey in clinical hypnotherapy.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Duration 5 Days 30 CPD hours This course is intended for This course is intended for professional web developers who use Microsoft Visual Studio in an individual-based or team-based, small-sized to large development environment. Candidates for this course are interested in developing advanced web applications and want to manage the rendered HTML comprehensively. They want to create websites that separate the user interface, data access, and application logic. Overview Describe the Microsoft Web Technologies stack and select an appropriate technology to use to develop any given application. Design the architecture and implementation of a web application that will meet a set of functional requirements, user interface requirements, and address business models. Configure the pipeline of ASP.NET Core web applications using middleware, and leverage dependency injection across applications. Develop a web application that uses the ASP.NET Core routing engine to present friendly URLs and a logical navigation hierarchy to users. Create Views in an application that display and edit data and interact with Models and Controllers. Connect an ASP.NET Core application to a database using Entity Framework Core. Implement a consistent look and feel across an entire web application. Write JavaScript code that runs on the client-side and utilizes the jQuery script library to optimize the responsiveness of an web application. Add client side packages and configure Task Runners. Run unit tests and debugging tools against a web application in Visual Studio 2022. Write an application that authenticates and authorizes users to access content securely using Identity. Build an application that resists malicious attacks. Use caching to accelerate responses to user requests. Use SignalR to enable two-way communication between client and server. Describe what a Web API is and why developers might add a Web API to an application. Describe how to package and deploy an ASP.NET Core web application from a development computer to a web server. In this 5-day course, professional web developers will learn to develop advanced ASP.NET Core applications using .NET tools and technologies. The focus will be on coding activities that enhance the performance and scalability of the Web site application. Module 1: Exploring ASP.NET Core Introducing of Microsoft Web Technologies Getting Started with Razor Pages in ASP.NET Core Introducing ASP.NET Core MVC Module 2: Designing ASP.NET Core MVC Web Applications Planning in the Project Design Phase Designing Models, Controllers and Views Module 3: Configure Middleware and Services in ASP.NET Core Configuring Middlewares Configuring Services Module 4: Developing Controllers Writing Controllers and Actions Configuring Routes Writing Action Filters Module 5: Developing Views Creating Views with Razor Syntax Using HTML Helpers and Tag Helpers Reusing Code in Views Module 6: Developing Models Creating MVC Models Working with Forms Validating User Input Module 7: Using Entity Framework Core in ASP.NET Core Introduction to Entity Framework Core Working with Entity Framework Core Use Entity Framework Core to connect to Microsoft SQL Server Module 8: Using Layouts, CSS and JavaScript in ASP.NET Core Using Layouts Using CSS and JavaScript Using JavaScript Libraries Module 9: Client-Side Development Applying Styles and Responsive Design Using Task Runners Looking at ASP.NET Core Blazor Module 10: Testing and Troubleshooting Testing ASP.NET Core Applications Implementing an Exception Handling Strategy Logging ASP.NET Core Applications Module 11: Managing Security Authentication in ASP.NET Core Authorization in ASP.NET Core Defending from Common Attack Module 12: Performance and Communication Implementing a Caching Strategy Managing State Supporting Two-way Communication Module 13: Implementing Web APIs Introducing Web APIs Developing a Web API Calling a Web API Module 14: Hosting and Deployment Hosting and Deploying On-premises Deploying to Microsoft Azure Looking at Microsoft Azure Fundamentals
Duration 1 Days 6 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who receive Tableau data visualizations from data analysts or from data visualization engineers. These data report recipients want to take advantage of the many Tableau features and capabilities that enable them to explore the data behind the initial analysis, perform additional analysis to ask next-level questions of the data, and to customize visualizations and dashboards to share new insights and create compelling reports. Overview Explore Tableau reports. Analyze data to get answers and insights. Sort and group data for analysis and reporting. Filter views. Prepare reports. Troubleshoot, collaborate, and share views and analysis As data acquisition, access, analysis, and reporting are interwoven with our businesses and lives, more and more data is collected about business and personal activities. This abundance of data and the computing power to analyze it has increased the use of data analysis and data visualization across a broad range of job roles. Decision makers of all types, including managers and executives, must interact with, interpret, and develop reports based on data and analysis provided to them. Tableau© software is designed for data analysis and the creation of visualizations. Data analysts prepare data, perform initial analysis, and create visualizations that are then passed on to business data-driven decision makers. These decision makers can use Tableau's tools to explore the data, perform further analysis to find new insights, make decisions, and create customized reports to share their findings. Prerequisites To ensure your success in this course, you should have experience managing data with Microsoft© Excel© or Google Sheets? Lesson 1: Exploring Tableau Reports Topic A: Data Analysis Workflow with Tableau Topic B: Explore Views Topic C: Edit Workbooks Lesson 2: Analyzing Data to Get Answers and Insights Topic A: Configure Marks with the Marks Card Topic B: Ask New Questions by Changing Aggregation Topic C: Find Answers with Calculations Topic D: Answer Questions with Table Calculations Lesson 3: Sorting and Grouping Data for Analysis and Reporting Topic A: Sort Data Topic B: Group Data Lesson 4: Filtering Views Topic A: Filter Data to Refine Analysis Topic B: Create Interactive Filters for Reports Lesson 5: Preparing Reports Topic A: Format and Annotate Views to Tell Your Story Topic B: Emphasize Data in Reports Topic C: Animate Visualizations for Clarity Lesson 6: Troubleshooting, Sharing, and Collaborating Topic A: Troubleshoot Data Issues Topic B: Collaborate in Tableau Online Topic C: Collaborate with Non-Tableau Users
SAFe® Lean Portfolio Management: In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function
Higher Level Security Management : Security Management, IT Security & Cyber Security Enhance your future with our specialized Security Management course. Discover Security Management principles, Security Management strategies, and Security Management best practices. Acquire in-depth Security Management knowledge and practical Security Management skills. Secure your success by enrolling in our Security Management course today! Elevate your career with Security Management expertise. Elevate your career with our cutting-edge Security Management course. Dive deep into Security Management, Security Management strategies, and Security Management techniques. Equip yourself with the latest Security Management knowledge and enhance your Security Management skills. Don't miss this opportunity to excel in Security Management. Unlock your potential with our comprehensive Security Management course. Delve into Security Management theories, Security Management strategies, and Security Management practices. Acquire the essential Security Management skills and knowledge to excel in your career. Invest in your future and join our Security Management course today! Are you passionate about Security Management? Our Security Management course is designed for you! Dive deep into Security Management, learn Security Management strategies, and explore Security Management best practices. Equip yourself with the latest Security Management knowledge and skills. Don't wait, enroll in our Security Management course and advance your career in Security Management today! Bundle Courses: Course 01: Security Management Course 02: IT Security Course 03: Cyber Security Course 04: General Data Protection (GDPR) Course 05: Financial Advisor Course 06: AML: Anti-Money Laundering Course 07: Level 7 Ledership & Management Certificate of Completion of Security Management After completing the MCQ/Assignment assessment for this Security Management : Security Management, IT Security & Cyber Security course, you will be entitled to a Certificate of Completion from Training Tale. As a result, by taking this Security Management : Security Management, IT Security & Cyber Security course, you could improve your skills and knowledge. Move one step closer to realizing your objective. Who is this course for? Higher Level Security Management : Security Management, IT Security & Cyber Security This Security Management : Security Management, IT Security & Cyber Security course is perfect for anyone who wants to make it a profession or further their education in Security Management, IT Security & Cyber Security. Requirements Higher Level Security Management : Security Management, IT Security & Cyber Security There are no specific requirements for this Security Management : Security Management, IT Security & Cyber Security course because it does not require any advanced knowledge or skills. Career path Higher Level Security Management : Security Management, IT Security & Cyber Security
This course covers import documentation and procedures, commercial considerations, the importance of your purchase order, calculating VAT and duty, and how to reduce import customs clearance delays.
Assuring Quality Through Acceptance Testing: Virtual In-House Training It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. It is the business analyst's job to define the business problem to be solved by IT. It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. The business analyst is not only concerned with the testing itself, but also with the management and monitoring of the users doing the acceptance testing, and recording, analyzing, and evaluating the results. What you will Learn Upon completion, participants will be able to: Create a set of acceptance test cases Manage and monitor an acceptance test stage where users perform the testing Work with the development team in the systems testing stage Assess the solution once it is in the business environment Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide BA roles and relationships through the project life cycle Introduction to assuring software quality through acceptance testing The Scope of IT Testing Overview of testing stages The testing process Testing documentation Pre-Acceptance Testing The BA's role in testing Early development testing stages (unit and integration) Late development testing stage (system) The Acceptance Test Stage - Part I (Planning, Design, and Development) Overview of user acceptance testing Acceptance test planning Designing user acceptance tests Developing individual user acceptance test cases Building effective user acceptance test scenarios The Acceptance Test Stage - Part II (Execution and Reporting) Operating guidelines Execution Reporting Post-Acceptance Testing Overview Project implementation Project transition (project closure) Production through retirement Testing Commercial Off-the-Shelf (COTS) Software Overview Selecting the software Implementing the software Summary What did we learn and how can we implement this in our work environments?
Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.