• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2999 Design courses in Warlingham delivered Live Online

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers interested in automation and programmability and who hold job roles such as: Account manager Consulting systems engineer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Wireless design engineer Wireless engineer Overview This course will help you: Gain the high-demand knowledge and skills to implement automation, streamline container orchestration, and enhance scalability Learn the skills to maximize the lightweight design of containers to scale more quickly and allow more responsiveness to website traffic load Prepare for the 300-910 DEVOPS exam What to expect in the exam The 300-910 DEVOPS exam certifies your knowledge and skills with DevOps. Key DevOps practices include deployment automation that enables configuration, management, and scalability of cloud microservices and infrastructure processes on Cisco platforms. This course teaches you how to automate application deployment, enable automated configuration, enhance management, and improve scalability of cloud microservices and infrastructure processes on Cisco© platforms. You will also learn how to integrate Docker and Kubernetes to create advanced capabilities and flexibility in application deployment. This course prepares you for the 300-910 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) certification exam. Course Outlines ITRODUCING THE DEVOPS MODEL INTRODUCING CONTAINERS PACKAGING AN APPLICATION USING DOCKER DEPLOYING A MULTITIER APPLICATION INTRODUCING CI/CD BUILDING THE DEVOPS FLOW VALIDATING THE APPLICATION BUILD PROCESS BUILDING AN IMPROVED DEPLOYMENT FLOW EXTENDING DEVOPS PRACTICES TO THE ENTIRE INFRASTRUCTURE IMPLEMENTING ON-DEMAND TEST ENVIRONMENTS AT THE INFRASTRUCTURE LEVEL MONITORING IN NETDEVOPS ENGINEERING FOR VISIBILITY AND STABILITY SECURING DEVOPS WORKFLOWS EXPLORING MULTICLOUD STRATEGIES EXAMINING APPLICATION AND DEPLOYMENT ARCHITECTURES DESCRIBING KUBERNETES INTEGRATING MULTIPLE DATA CENTER DEPLOYMENTS WITH KUBERNETES MONITORING AND LOGGING IN KUBERNETES Additional course details: Nexus Humans Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing DevOps Solutions and Practices Using Cisco Platforms (DevOps) 1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Women in Insurance Leadership Workshop

5.0(1)

By Own Your Success

Join our Women in Insurance Leadership Workshop and gain insights from industry experts on how to succeed in the male-dominated insurance sector. This workshop is designed to empower women by providing valuable tools and resources to enhance leadership skills, build professional networks, and create a more inclusive workplace culture. Don't miss this opportunity to connect with other women in the industry and take your career to the next level. Register today!

Women in Insurance Leadership Workshop
Delivered OnlineJoin Waitlist
£445

Cisco Implementing and Operating Cisco Enterprise Network Core Technologies v1.3 (ENCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Entry- to mid-level network engineers Network administrators Network support technicians Help desk technicians Overview After taking this training, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implement redundant switched networks using Spanning Tree Protocol Troubleshoot link aggregation using Etherchannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6 Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You?ll also learn to understand and implement security principles and automation and programmability within an enterprise network. Course Outline Examining Cisco Enterprise Network Architecture Exploring Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Implementing Wireless Client Authentication Troubleshooting Wireless Client Connectivity Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Discovering the Basics of Python Programming Discovering Network Programmability Protocols Implementing Layer 2 Port Aggregation Discovering Multicast Protocols Understanding QoS Exploring Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution

Cisco Implementing and Operating Cisco Enterprise Network Core Technologies v1.3 (ENCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Project Stakeholder Relationship Skills: Virtual In-House Training

By IIL Europe Ltd

Project Stakeholder Relationship Skills: Virtual In-House Training This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What you Will Learn Examine traditional and non-traditional ways to identify and assess stakeholders Explain how competence, character, and trust lead to project success and strong relationships with stakeholders Utilize 'Embodied Leadership' skills to build stakeholder relationships Apply stakeholder engagement best practices to case study and real-life scenarios Getting Started Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations

Project Stakeholder Relationship Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Building High-Performance Teams: Virtual In-House Training

By IIL Europe Ltd

Building High-Performance Teams: Virtual In-House Training This course pulls together the most current and popular theories and writings on this complex topic and presents this amalgamated view in a highly interactive workshop and activity-based approach. Students will understand and have the skills required to build and participate in high-performance project teams and will possess the insight to proactively affect change within their respective organizations by guiding the existing culture to one that promotes high performance. What you will Learn At the end of this program, you will be able to: Define a team and describe the optimum team size for effective performance Describe characteristics and guiding behaviors of high-performance teams Describe the major elements of each development stage in two distinct models Recognize cultural barriers in achieving high performance List the attributes of a high-performing corporate culture Assess your own corporate culture Discuss corporate leadership as a factor in building high-performance project teams Describe the three A's of selecting team members State three leadership responsibilities Describe leadership responsibilities, styles, and roles List and describe the eight components of the team charter model for building high-performance teams Foundation Concepts The Nature of Teams Characteristics of High-Performance Teams Understanding Team Development Stages of Team Development - Model 1 Stages of Team Development - Model 2 Designing a High-Performance Culture Corporate Cultures Corporate Leadership Establishing the Attributes of High Performance Choosing the Right People Team Effectiveness Team Leadership The Team Charter Model

Building High-Performance Teams: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Project Stakeholder Relationship Skills (Virtual)

By IIL Europe Ltd

Project Stakeholder Relationship Skills (Virtual) This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What You Will Learn At the end of this program, you will be able to: Gain a deep understanding of the Scrum Framework - the theory, practices, roles, rules, and values - as defined in The Scrum Guide Understand, in detail, the role of Scrum Master, and how the role interacts with different members of the Scrum Team and other stakeholders Master the Scrum principles to better understand their application when returning to the workplace Understand how to construct an effective development team with an appropriate mix of skills and experience Know how to act as a servant-leader for the Scrum Team, promoting and enabling self-organization to create high-value products. Learn how to facilitate Scrum Events and remove impediments to the Scrum Team's progress Help Scrum Product Owners shape and refine product backlogs to guide early and incremental delivery of valuable products Drive adoption of the Scrum framework for more effective product and solution development, working with stakeholders and other Scrum Masters to improve its effectiveness Foundation Concepts Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations

Project Stakeholder Relationship Skills (Virtual)
Delivered OnlineFlexible Dates
£850

Effective Negotiation Skills for Business Success (Virtual)

By IIL Europe Ltd

Effective Negotiation Skills for Business Success (Virtual) Become skillful at dealing with unworkable differences - situations where there appears to be no acceptable compromise or acceptable solution. This interactive workshop shows you how to work towards agreements where all parties are satisfied that they have reached a wise outcome efficiently, and where they can come back to the table in the future because the relationship is intact. You will have the opportunity to re-visit a difficult / challenging negotiation that you experienced in the past as well as take part in progressively more challenging case studies that are tailored to the work you do. You will enhance your personal and professional life with powerful new negotiating skills. The goal of this workshop is to improve your negotiation skills by helping you to identify your own preferred negotiation style and strategies, and to learn about the need to plan for any upcoming negotiation. The workshop is also designed for you to experience typical negotiation situations at certain key points of the life cycle of a project, enabling you to develop an awareness of your effectiveness during negotiations at these stages. The majority of time is spent on practicing newly presented negotiation techniques and receiving feedback on application for further development and improvement. What you will Learn At the end of this program, you will be able to: Identify your preferred negotiation style and strategies Examine the Principled Negotiation Model Adapt your negotiation strategy to the progress of the negotiation Experience typical negotiation situations during the life cycle of a project Develop an awareness of your effectiveness during negotiations Improve your negotiation skills Negotiation Model Negotiation defined Negotiation phases Common approaches to negotiating Principled Negotiating Principled negotiation and the four rules Best alternative to a negotiated agreement Project Negotiation Simulation: Part 1 and Part 2 Project Negotiation Simulation: Part 1 Project Negotiation Simulation: Part 2 Negotiating Cases Negotiating cases Summary and Next Steps

Effective Negotiation Skills for Business Success (Virtual)
Delivered OnlineFlexible Dates
£850

EXPOSURE THERAPY PACKAGE M.D.D (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing the Exposure Therapy Package: Confront Your Fears, Embrace Resilience, and Regain Control Are you tired of being held captive by anxiety and fear? Miss Date Doctor’s Exposure Therapy Package offers you a proven and powerful approach to confront your fears, build resilience, and regain control over your life. Exposure Therapy is a specialized form of cognitive-behavioral therapy that helps individuals gradually face their fears in a safe and controlled environment. By systematically confronting anxiety-provoking situations, you’ll learn to retrain your brain’s response to fear, leading to reduced anxiety and increased confidence. Here’s how the Exposure Therapy Package can support you: Systematic Exposure: Under the guidance of our experienced therapists, exposure therapy will gradually introduce you to anxiety triggers in a controlled and supportive manner. As you confront your fears step-by-step, you’ll learn to manage anxiety more effectively. Fear Reduction: Exposure therapy helps desensitize your fear response by repeatedly exposing you to anxiety-inducing situations. Over time, your brain will adapt to these situations, leading to a reduction in anxiety levels. Empowering Coping Strategies: Our therapists will equip you with effective coping strategies to manage anxiety and distress during exposure sessions. These techniques will empower you to face challenges with increased confidence. Regaining Control: Exposure therapy provides a sense of control over anxiety-provoking situations. As you confront your fears, you’ll realize that you have the power to influence your response to anxiety, fostering a renewed sense of agency. Lasting Results: Exposure therapy is designed to produce long-lasting results. By learning to confront and manage fears, you’ll carry this resilience and newfound confidence into various aspects of your life. Customized Treatment: The Exposure Therapy Package is tailored to your specific fears and triggers. Your therapy sessions will be personalized to address your unique needs and challenges. Safe and Supportive Environment: Our therapists provide a safe and supportive environment during exposure sessions. You’ll have the guidance and encouragement needed to navigate anxiety-provoking situations with confidence. Exposure therapy is a transformational journey that allows you to break free from the grip of anxiety and reclaim your life. The Exposure Therapy Package at Miss Date Doctor is designed to empower you to face your fears, build resilience, and experience lasting relief from anxiety. Take the first step towards a more empowered and anxiety-free life with the Exposure Therapy Package. Embrace the journey of growth and regain control over your emotions and experiences. Confront your fears, unlock your potential, and step into a future filled with resilience and confidence. 3 x 1 hour sessions https://relationshipsmdd.com/product/exposure-therapy-package-m-d-d/

EXPOSURE THERAPY PACKAGE M.D.D (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£700