• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3761 Design courses

Sew a Sundress - Fleetwood Frock by Sew Different

5.0(49)

By Stitching Kitchen

Spend a day at Stitching Kitchen creating a sun dress with expert tuition from Emma Smith.

Sew a Sundress - Fleetwood Frock by Sew Different
Delivered In-Person in Brackley
£125

Stained Glass Garden Mosaic - 2 days

By Sue Smith Glass

This course is stained glass mosaic on a mirror base and designed for garden display throughout the year. The aim of the course is to teach you the techniques and throughout the workshop build your confidence and knowledge to complete a stunning mosaic for you to take home.

Stained Glass Garden Mosaic - 2 days
Delivered In-PersonFlexible Dates
£180

Build A 6 Board Chest

By Lowfat Roubo

LEARN TO CONSTRUCT A SIMPLE CHEST

Build A 6 Board Chest
Delivered In-PersonFlexible Dates
£325

Danish cord weaving-Make a classic Danish Bench Stool

By Woodworker

Danish cord weaving course. Danish cord weaving is a great skill to master. The classic look comes from the Danish furniture designer Hans Wegner, the style of weaving cord has a cool mid century look, and has had a massive rebound in modern day furniture and interior design. What makes Danish cord weaving unique is the fact its NOT a manufactured machining process. All weaving is by hand by a person, this alone makes these much desired pieces of furniture, stand out in this massive production based world. Truly a unique handmade, bespoke design, with great mass appeal. The course is 2 days, you will be provided with the base bench frame premade in Solid oak. During the first day we will finish the stool, we will show types of wood finishing i.e oil, lacquer etc.. and prepare for the weaving process. We will talk in length and demonstrate Danish cord weaving, and a overview of the making of the stool frame. During day two you will spend the day weaving your stool to completion, by the end of the day you will have a beautiful stool to take home and admire your new found skill. What's included in the price? Stool frame in Solid Oak Wood Finish All weaving cord to complete your stool. Tea and Coffee Cancellation policy Easy - Cancellation and a full refund can be obtained up to 2 weeks before the course starts

Danish cord weaving-Make a classic Danish Bench Stool
Delivered In-PersonFlexible Dates
£450

Learn to Crochet - 4 x2 hour sessions - Tues evenings - Walton-on-Thames

By Merrian Holland

Learn to crochet in Surrey - this is an immersive 4 x 2 hour course running on Tuesday evenings in Walton-on-Thames.

Learn to Crochet - 4 x2 hour sessions - Tues evenings - Walton-on-Thames
Delivered In-Person in Walton-on-Thames
£100

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

Promoting Best Practice in Teaching and Assessing Medicines Management (Medication Train the Trainer)

By Guardian Angels Training

"Empower educators and healthcare professionals with evidence-based teaching strategies and practical assessment methods through our 'Promoting Best Practice in Teaching and Assessing Medicines Management' course. Ensure safe and competent medication administration practices among healthcare learners. Enroll now."

Promoting Best Practice in Teaching and Assessing Medicines Management (Medication Train the Trainer)
Delivered In-Person in InternationallyFlexible Dates
£1,895

Introduction to Off-Loom Weaving

By Elka

'Introduction to Off-Loom Weaving' workshop in the beautiful setting of Fisherton Mill in Salisbury, Wiltshire. Learn how to select the right yarns for your weaving project and use branches, stones and other items from nature as your loom. Spend a day learning basic weaving techniques in this relaxed & informative beginners weaving workshop. All materials and equipment are provided and you will leave with a clear handout of notes and your first woven pieces, made from organic cotton and linen, and many more sustainable materials.

Introduction to Off-Loom Weaving
Delivered In-PersonFlexible Dates
£130

Writing and Managing Requirements Documents

By IIL Europe Ltd

Writing and Managing Requirements Documents This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)

Writing and Managing Requirements Documents
Delivered In-Person in LondonFlexible Dates
£1,495