Welcome to a project-based intermediate course. This course is designed to learn how to create new and exciting projects using various python modules. In each section, we will build a project and with each project, you will learn how to create an online multiplayer game, AOL-style chat room, and more!
This course is designed to help you master the concepts of JavaScript needed to create interactive web games. You will create five interesting word games that will teach you how to write and test the game code in JavaScript.
Overview Dive into the exciting world of coding with our comprehensive Coding with Scratch course. From the very start, you’ll be introduced to the basics, including how to get started with Scratch, creating and manipulating sprites, and setting up engaging backdrops. As you progress, you'll explore essential coding concepts such as motion blocks, looks, sound, and events, giving you a solid foundation in coding fundamentals. The course continues with in-depth tutorials on control, operators, sensing, and variables, which are crucial for developing complex coding projects. A sample activity and guidance on creating your own sample activities will provide practical, hands-on experience. Perfect for beginners and those looking to enhance their coding skills, this course offers a structured approach to mastering coding with Scratch, equipping you with the tools to build your own interactive projects and games. So enrol in this course today to fast-track your career ladder. Key Features of the Course: FREE Coding with Scratch CPD-accredited certificate Get a free student ID card with Coding with Scratch training (£10 applicable for international delivery) Lifetime access to the Coding with Scratch course materials The Coding with Scratch program comes with 24/7 tutor support Get instant access to this Coding with Scratch course Learn Coding with Scratch training from anywhere in the world The Coding with Scratch training is affordable and simple to understand The Coding with Scratch training is entirely online How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the Coding with Scratch course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Coding with Scratch. It is available to all students, of all academic backgrounds. Requirements Our Coding with Scratch is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Explore diverse career opportunities with our Coding with Scratch course: Junior Software Developer: £25,000 - £35,000 Game Designer: £28,000 - £40,000 Coding Instructor: £22,000 - £30,000 Interactive Media Designer: £30,000 - £45,000 Educational Technologist: £25,000 - £38,000 App Developer: £30,000 - £50,000 Course Curriculum 5 sections • 17 lectures • 01:54:00 total length •Meet your instructor: 00:01:00 •Article 1: 00:58:00 •Article 2: 00:10:00 •Getting Started with Scratch: 00:02:00 •Sprites: 00:03:00 •Backdrops: 00:02:00 •Motion blocks: 00:04:00 •Looks: 00:05:00 •Sound: 00:02:00 •Events: 00:04:00 •Control: 00:05:00 •Operators: 00:01:00 •Sensing: 00:05:00 •Variables: 00:03:00 •Sample Activity: 00:01:00 •How to make a sample activity: 00:08:00 •Assignment - Coding with Scratch: 00:00:00
Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment
Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00
Learn and master HTML, CSS, Bootstrap, and SASS. Starts right from the basics and increases its level step by step by understanding various concepts, implementing them with different exercises, practicing with games, and building 6 real-world projects.
Uncover Excel 2019's potential through our comprehensive Microsoft Excel course. It empowers you to master features, calculations, data analysis, and automation. Whether you're new to spreadsheets or aiming for data expertise, this course is tailored for you. Our Microsoft Excel course simplifies Excel's complexities, making it beginner-friendly. It equips you with skills vital in today's data-driven landscape. Beyond personal growth, this Microsoft Excel course boosts career prospects. Excel proficiency is valuable in a competitive job market, opening doors to diverse opportunities. Our course is a transformative journey into Excel 2019, unlocking potential, enhancing skills, and advancing careers. Whether you're a novice or aspiring data pro, it's your key to Excel's power and your potential. Learning Outcomes of our Microsoft Excel course: Master Microsoft Excel 2019's latest features. Perform complex calculations with ease. Create visually appealing and well-formatted worksheets. Analyze and visualize data effectively using charts and PivotTables. Automate workbook tasks with Excel VBA. Why buy this Advanced Diploma in Microsoft Excel Complete Course 2019 at QLS Level 7? Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Who is this Advanced Diploma in Microsoft Excel Complete Course 2019 at QLS Level 7 for? Individuals new to Microsoft Excel looking to build a strong foundation. Students and job seekers aiming to enhance their employability. Business professionals wanting to improve data management and analysis skills. Entrepreneurs seeking to streamline their business processes. Anyone interested in harnessing the power of Excel for personal or professional growth. Prerequisites This Advanced Diploma in Microsoft Excel Complete Course 2019 at QLS Level 7 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Data Analyst: £25,000 - £40,000 per year Financial Analyst: £30,000 - £50,000 per year Business Intelligence Analyst: £30,000 - £55,000 per year Operations Manager: £35,000 - £70,000 per year Project Manager: £40,000 - £70,000 per year Excel VBA Developer: £35,000 - £60,000 per year Certification After studying the course materials of the Advanced Diploma in Microsoft Excel Complete Course 2019 at QLS Level 7 you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £4.99. Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £135 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Microsoft Excel 2019 New Features Introduction to Microsoft Excel 2019 New Features 00:07:00 CONCAT 00:02:00 IFS 00:01:00 MAXIFS 00:01:00 MINIFS 00:01:00 SWITCH 00:02:00 TEXTJOIN 00:01:00 Map Chart 00:02:00 Funnel Chart 00:01:00 Better Visuals 00:06:00 Pivot Table Enhancements 00:02:00 Power Pivot Updates 00:01:00 Getting Started with Microsoft Office Excel Navigate the Excel User Interface 00:28:00 Use Excel Commands 00:10:00 Create and Save a Basic Workbook 00:19:00 Enter Cell Data 00:12:00 Use Excel Help 00:05:00 Performing Calculations Create Worksheet Formulas 00:15:00 Insert Functions 00:17:00 Reuse Formulas and Functions 00:17:00 Modifying a Worksheet Insert, Delete, and Adjust Cells, Columns, and Rows 00:10:00 Search for and Replace Data 00:09:00 Use Proofing and Research Tools 00:07:00 Formatting a Worksheet Apply Text Formats 00:16:00 Apply Number Format 00:08:00 Align Cell Contents 00:09:00 Apply Styles and Themes 00:12:00 Apply Basic Conditional Formatting 00:11:00 Create and Use Templates 00:08:00 Printing Workbooks Preview and Print a Workbook 00:10:00 Set Up the Page Layout 00:09:00 Configure Headers and Footers 00:07:00 Managing Workbooks Manage Worksheets 00:05:00 Manage Workbook and Worksheet Views 00:07:00 Manage Workbook Properties 00:06:00 Working with Functions Work with Ranges 00:18:00 Use Specialized Functions 00:11:00 Work with Logical Functions 00:23:00 Work with Date & Time Functions 00:08:00 Work with Text Functions 00:11:00 Working with Lists Sort Data 00:10:00 Filter Data 00:10:00 Query Data with Database Functions 00:09:00 Outline and Subtotal Data 00:09:00 Analyzing Data Apply Intermediate Conditional Formatting 00:07:00 Apply Advanced Conditional Formatting 00:05:00 Visualizing Data with Charts Create Charts 00:13:00 Modify and Format Charts 00:12:00 Use Advanced Chart Features 00:12:00 Using PivotTables and PivotCharts Create a PivotTable 00:13:00 Analyze PivotTable Data 00:12:00 Present Data with PivotCharts 00:07:00 Filter Data by Using Timelines and Slicers 00:11:00 Working with Multiple Worksheets and Workbooks Use Links and External References 00:12:00 Use 3-D References 00:06:00 Consolidate Data 00:05:00 Using Lookup Functions and Formula Auditing Use Lookup Functions 00:12:00 Trace Cells 00:09:00 Watch and Evaluate Formulas 00:08:00 Sharing and Protecting Workbooks Collaborate on a Workbook 00:19:00 Protect Worksheets and Workbooks 00:08:00 Automating Workbook Functionality Apply Data Validation 00:13:00 Search for Invalid Data and Formulas with Errors 00:04:00 Work with Macros 00:18:00 Creating Sparklines and Mapping Data Create Sparklines 00:07:00 MapData 00:07:00 Forecasting Data Determine Potential Outcomes Using Data Tables 00:08:00 Determine Potential Outcomes Using Scenarios 00:09:00 Use the Goal Seek Feature 00:04:00 Forecasting Data Trends 00:05:00 Excel VBA Data Management Create a Macro Using the Macro Recorder 01:00:00 Edit a Macro 01:00:00 Debug a Macro 00:30:00 Customize the Quick Access Toolbar and Hotkeys 00:30:00 Set Macro Security 01:00:00 Insert Text 00:30:00 Format Text 00:30:00 Sort Data 00:30:00 Duplicate Data 01:00:00 Generate a Report 01:00:00 Determine the Dialog Box Type 00:15:00 Capture User Input 01:00:00 Insert, Copy, and Delete Worksheets 00:30:00 Rename Worksheets 00:30:00 Modify the Order of Worksheets 00:15:00 Print Worksheets 00:30:00 Create User-Defined Functions 00:30:00 Automate SUM Functions 00:30:00 Excel Templates Excel Templates 00:00:00 Resources Resources - Microsoft Excel - Beginner Course - Cpd Accredited 00:00:00 Mock Exam Mock Exam - Microsoft Excel Complete Course 2019 00:20:00 Final Exam Final Exam - Microsoft Excel Complete Course 2019 00:20:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00
About this Virtual Instructor Led Training (VILT) Hydrogen will play an increasingly critical role in the future of energy system as it moves forward to supplement and potentially replace fossil fuels in the long run. Offshore wind offers a clean and sustainable renewable resource for green hydrogen production. However, it can also be volatile and presents inherent risks that need to be managed. Even though offshore production of hydrogen has yet to achieve a high state of maturity, many current projects are already dealing with the conditions and effects of offshore production of hydrogen and are grappling with the technological requirements and necessary gas transportation with grid integration. This 2 half-day Virtual Instructor Lead Training (VILT) course will examine the technological options for on-site production of hydrogen by electrolysis (onshore or offshore directly at the platform) as well as the transport of hydrogen (pipeline or ship). This VILT course will also explore the economic considerations and the outlook on future market opportunities. There will be exercises for the participants to work on over the two half-days. This course is delivered in partnership with Fraunhofer IEE. Training Objectives By the end of this VILT course, participants will be able to: Understand the technological attributes and options for green hydrogen production based on electricity from offshore wind. Explore the associated economic analysis for offshore wind hydrogen production, including CAPEX, OPEX, LCOE and LCOH Identify the critical infrastructure and technical configuration required for offshore green hydrogen including transportation networks and grid connectivity Learn from recent findings from current Research & Development projects concerning the differences between onshore and offshore hydrogen production. Target Audience This VILT course is intended: Renewable energy developers and operators Offshore oil & gas operators Energy transport and marine operators Energy policy makers and regulators IPPs and power utilities Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Trainer 1: Your expert course leader is Director of Energy Process Technology Division at the Fraunhofer Institute for Energy Economics and Energy System Technology, IEE. The research activities of the division link the areas of energy conversion processes and control engineering. The application fields covered are renewable energy technologies, energy storage systems and power to gas with a strong focus on green hydrogen. From 2006 - 2007, he worked as a research analyst of the German Advisory Council on Global Change, WBGU, Berlin. He has extensive training experience from Bachelor and Master courses at different universities as well as in the context of international training activities - recently on hydrogen and PtX for partners in the MENA region and South America. He holds a University degree (Diploma) in Physics, University of Karlsruhe (KIT). Trainer 2: Your expert course leader is Deputy Head of Energy Storage Department at Fraunhofer IEE. Prior to this, he was the director of the Grid Integration Department at SMA Solar Technology AG, one of the world's largest manufacturers of PV power converters. Before joining SMA, he was manager of the Front Office System Planning at Amprion GmbH (formerly RWE TSO), one of the four German transmission system operators. He holds a Degree of Electrical Engineering from the University of Kassel, Germany. In 2003, he finished his Ph.D. (Dr.-Ing.) on the topic of wind power forecasting at the Institute of Solar Energy Supply Technology (now known as Fraunhofer IEE) in Kassel. In 2004, he started his career at RWE TSO with a main focus on wind power integration and congestion management. He is Chairman of the IEC SC 8A 'Grid Integration of Large-capacity Renewable Energy (RE) Generation' and has published several papers about grid integration of renewable energy source and forecasting systems on books, magazines, international conferences and workshops. Trainer 3: Your expert course leader is Deputy Director of the Energy Process Technology division and Head of the Renewable Gases and Bio Energy Department at Fraunhofer IEE. His work is mainly focused on the integration of renewable gases and bioenergy systems into the energy supply structures. He has been working in this field since more than 20 years. He is a university lecturer in national and international master courses. He is member of the scientific advisory council of the European Biogas Association, member of the steering committee of the Association for Technology and Structures in Agriculture, member of the International Advisory Committee (ISAC) of the European Biomass Conference and member of the scientific committees of national bioenergy conferences. He studied mechanical engineering at the University of Darmstadt, Germany. He received his Doctoral degree on the topic of aerothermodynamics of gas turbine combustion chambers. He started his career in renewable energies in 2001, with the topic of biogas fired micro gas turbines. Trainer 4: Your expert course leader has an M. Sc. and she joined Fraunhofer IEE in 2018. In the Division of Energy Process Technology, she is currently working as a Research Associate on various projects related to techno-economic analysis of international PtX projects and advises KfW Development Bank on PtX projects in North Africa. Her focus is on the calculation of electricity, hydrogen and derivative production costs (LCOE, LCOH, LCOA, etc) based on various methods of dynamic investment costing. She also supervises the development of models that simulate different PtX plant configurations to analyze the influence of different parameters on the cost of the final product, and to find the configuration that gives the lowest production cost. She received her Bachelor's degree in Industrial Engineering at the HAWK in Göttingen and her Master's degree in renewable energy and energy efficiency at the University of Kassel. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
DevOps training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps training course details Who will benefit: IT development, IT operations and IT service management. Prerequisites: Introduction to data communications & networking. Duration 2 days DevOps training course contents Why DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture. Implementation Challenges, risks and critical success factors Measuring DevOps successes
Learn to build an amazing REST API with Spring Boot and understand what all this hype about microservices is about.