A webinar in which we explore the true cost of pointless stress and worry on our health, our happiness and our time and present the possibility of a future with more balance, more joy and better outcomes.
A free, interactive session for women, about trauma and how to heal from it.
Music Audio Stories presents Can You Count It? Free Video Series ▫️ Fun videos to help your child learn numbers 1 to 10, and develop visual and spelling skills. We are thrilled to introduce our video series called, Can You Count It? Children will learn numbers 1 to 10, see how to spell and pronounce each number, and enjoy counting to 10 with fun illustrations and numbers. With illustrations, voice-overs, animations, and music, this video series will help to teach children to count in a fun and easy way. Children will: ▪️See examples of each number ▪️Hear how each number is pronounced ▪️Learn how to spell each number ▪️Have fun counting the numbers ▪️Improve concentration and visual skills ▪️Love the fun illustrations and characters ▪️Enjoy sound effects and music ⏰ Videos are released on Saturdays at 11 am on YouTube. Subscribe to our channel here: https://www.youtube.com/user/MusicAudioStories and hit the bell to make sure you don't miss a new video. Video Series Playlist: https://shorturl.at/xlNdy Find out why it's important to develop colour recognition here: https://musicaudiostories.com/blog/can-you-count-it Enjoy! ♥ Music Audio Stories - Making learning easy and fun! Music Audio Stories is an original company specialising in entertaining music audiobooks, picture books, interactive activities, fun videos, and unique storytelling with multi-award-winner, 'Storytime with Anna Christina'. Music Audio Stories are interactive audiobooks with full orchestral scores and magical soundtracks, catchy sing-along songs and fun stories that teach and uplift little listeners. Videos include uniquely entertaining Storytimes with music, sound effects, narration, voice-overs, illustrations, and animations. Plus delightful activity videos for listening, learning, reading, drawing, and lots of fun! ---------- Website: http://www.musicaudiostories.com/ Storytime: http://storytimewithannachristina.com/ ---------- Subscribe to get a free music audiobook at: http://www.musicaudiostories.com/#subscribe ---------- Twitter: https://twitter.com/musicaudiostory Instagram: https://www.instagram.com/musicaudiostories/ Facebook: https://www.facebook.com/musicaudiostories/ Storytime with Anna Christina Instagram: https://www.instagram.com/storytimewithannachristina/
leadership management training course MBTI personality profiling
The HoardingUK National Hoarding Conference is back in 2024! This year we're looking at what IS working. Our expert panel will include housing, environmental health, fire service, social care and other relevant professionals. Attend to hear how we've jointly overcome hurdles to deliver a successful, integrated, cost-effective, time managed programme.
Duration 1 Days 6 CPD hours Overview Understand problems and the creative problem solving processIdentify types of information to gather and key questions to ask in problem solving Identify the importance of defining a problem correctlyIdentify and use four different problem definition toolsWrite concrete problem statementsUse basic brainstorming tools to generate ideas for solutionsEvaluate potential solutions against criteria, including cost/benefit analysis and group votingPerform a final analysis to select a solutionUnderstand the roles that fact and intuition play in selecting a solutionUnderstand the need to refine the shortlist and redefine itUnderstand how to identify the tasks and resources necessary to implement solutionsEvaluate and adapt solutions to reality This workshop will give students an overview of the creative problem solving process, as well as key problem solving tools that they can use every day. Skills such as brainstorming, information gathering, & analyzing data will be covered during class. Getting Started Workshop Objectives The Problem Solving Method What is a Problem? What is Creative Problem Solving? What are the Steps in the Creative Solving Process? Case Study Module Two: Review Questions Information Gathering Understanding Types of Information Identifying Key Questions Methods of Gathering Information Case Study Module Three: Review Questions Problem Definition Defining the Problem Determining Where the Problem Originated Defining the Present State and the Desired State Stating and Restating the Problem Analyzing the Problem Writing the Problem Statement Case Study Module Four: Review Questions Preparing for Brainstorming Identifying Mental Blocks Removing Mental Blocks Stimulating Creativity Case Study Module Five: Review Questions Generating Solutions (I) Identifying Mental Blocks Removing Mental Blocks Stimulating Creativity Case Study Module Five: Review Questions Generating Solutions (II) The Morphological Matrix The Six Thinking Hats The Blink Method Case Study Module Seven: Review Questions Analyzing Solutions Developing Criteria Analyzing Wants and Needs Using Cost/Benefit Analysis Case Study Module Eight: Review Questions Selecting a Solution Doing a Final Analysis Paired Comparison Analysis Analyzing Potential Problems Case Study Module Nine: Review Questions Planning Your Next Steps Identifying Tasks Identifying Resources Implementing, Evaluating, and Adapting Case Study Module Ten: Review Questions Creating a Performance Plan Planning the Follow-Up Meeting Celebrating Successes Identifying Improvements Case Study Module Eleven: Review Questions Wrapping Up Words from the Wise Lessons Learned
Duration 3 Days 18 CPD hours This course is intended for Data Science for Marketing Analytics is designed for developers and marketing analysts looking to use new, more sophisticated tools in their marketing analytics efforts. It'll help if you have prior experience of coding in Python and knowledge of high school level mathematics. Some experience with databases, Excel, statistics, or Tableau is useful but not necessary. Overview By the end of this course, you will be able to build your own marketing reporting and interactive dashboard solutions. The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you'll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.As you make your way through the course, you'll explore ways to evaluate and select the best segmentation approach, and go on to create a linear regression model on customer value data to predict lifetime value. In the concluding sections, you'll gain an understanding of regression techniques and tools for evaluating regression models, and explore ways to predict customer choice using classification algorithms. Finally, you'll apply these techniques to create a churn model for modeling customer product choices. Data Preparation and Cleaning Data Models and Structured Data pandas Data Manipulation Data Exploration and Visualization Identifying the Right Attributes Generating Targeted Insights Visualizing Data Unsupervised Learning: Customer Segmentation Customer Segmentation Methods Similarity and Data Standardization k-means Clustering Choosing the Best Segmentation Approach Choosing the Number of Clusters Different Methods of Clustering Evaluating Clustering Predicting Customer Revenue Using Linear Regression Understanding Regression Feature Engineering for Regression Performing and Interpreting Linear Regression Other Regression Techniques and Tools for Evaluation Evaluating the Accuracy of a Regression Model Using Regularization for Feature Selection Tree-Based Regression Models Supervised Learning: Predicting Customer Churn Classification Problems Understanding Logistic Regression Creating a Data Science Pipeline Fine-Tuning Classification Algorithms Support Vector Machine Decision Trees Random Forest Preprocessing Data for Machine Learning Models Model Evaluation Performance Metrics Modeling Customer Choice Understanding Multiclass Classification Class Imbalanced Data Additional course details: Nexus Humans Data Science for Marketing Analytics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data Science for Marketing Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This basic course is for those who will be administering Information Server and its product components. Overview List Information Server functional categories and the Information Server products and components that support themList and describe the Information Server architectural tiersAccess Information Server clients, including thin clients using the Information Server Launch Pad, the Information Server Engine clients, and the Information Server Console clients including Information Analyzer and Information Services DirectorCreate and configure Information Server users and groupsManage Information Server active sessionsManage Information Server reportingWork with Information Server command-line tools including tools for session administration, user and group management, and encryptionUse the istool functionality to query, export, and import Information Server Repository assets This course gets those charged with administering Information Server v11.5 and its suite of many products and components started with the basic administrative tasks necessary to support Information Server users and developers. Information Server Technical Overview List the Information Server functional categories List the Information Server products and components that support these functional categories List the Information Server architectural tiers Working with Information Server Clients Use the Information Server Launch Pad to access Information Server thin clients including the Administrative Console, Information Governance Catalog, and Metadata Asset Manager Access Information Server Engine Clients including DataStage, QualityStage, FastTrack, and Information Server Manager Access Information Server Console Clients including Information Analyzer and Information Services Director Authentication and Suite Security Configure Suite users and groups Configure DataStage credentials for Engine users Session Management View a list of active sessions View session properties Disconnect sessions Configure global session properties Managing Reports Create and manage report folders Create a report Run a report View report results Administrative Tools Session Admin tool Directory Command tool Encrypt tool Managing Information Server Repository Assets Use istool to export and import common metadata assets Use istool to query information assets Use istool to export and import security assets Use istool to export and import reporting assets
Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with Intermediate IT skills who wish to learn Computer Vision with tensor flow 2 Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Computer Vision expert instructor, students will learn about and explore how to Build, train, and serve your own deep neural networks with TensorFlow 2 and Keras Apply modern solutions to a wide range of applications such as object detection and video analysis Run your models on mobile devices and web pages and improve their performance. Create your own neural networks from scratch Classify images with modern architectures including Inception and ResNet Detect and segment objects in images with YOLO, Mask R-CNN, and U-Net Tackle problems faced when developing self-driving cars and facial emotion recognition systems Boost your application's performance with transfer learning, GANs, and domain adaptation Use recurrent neural networks (RNNs) for video analysis Optimize and deploy your networks on mobile devices and in the browser Computer vision solutions are becoming increasingly common, making their way into fields such as health, automobile, social media, and robotics. Hands-On Computervision with TensorFlow 2 is a hands-on course that thoroughly explores TensorFlow 2, the brandnew version of Google's open source framework for machine learning. You will understand how to benefit from using convolutional neural networks (CNNs) for visual tasks. This course begins with the fundamentals of computer vision and deep learning, teaching you how to build a neural network from scratch. You will discover the features that have made TensorFlow the most widely used AI library, along with its intuitive Keras interface. You'll then move on to building, training, and deploying CNNs efficiently. Complete with concrete code examples, the course demonstrates how to classify images with modern solutions, such as Inception and ResNet, and extract specific content using You Only Look Once (YOLO), Mask R-CNN, and U-Net. You will also build generative dversarial networks (GANs) and variational autoencoders (VAEs) to create and edit images, and long short-term memory networks (LSTMs) to analyze videos. In the process, you will acquire advanced insights into transfer learning, data augmentation, domain adaptation, and mobile and web deployment, among other key concepts Computer Vision and Neural Networks Computer Vision and Neural Networks Technical requirements Computer vision in the wild A brief history of computer vision Getting started with neural networks TensorFlow Basics and Training a Model TensorFlow Basics and Training a Model Technical requirements Getting started with TensorFlow 2 and Keras TensorFlow 2 and Keras in detail The TensorFlow ecosystem Modern Neural Networks Modern Neural Networks Technical requirements Discovering convolutional neural networks Refining the training process Influential Classification Tools Influential Classification Tools Technical requirements Understanding advanced CNN architectures Leveraging transfer learning Object Detection Models Object Detection Models Technical requirements Introducing object detection A fast object detection algorithm YOLO Faster R-CNN ? a powerful object detection model Enhancing and Segmenting Images Enhancing and Segmenting Images Technical requirements Transforming images with encoders-decoders Understanding semantic segmentation Training on Complex and Scarce Datasets Training on Complex and Scarce Datasets Technical requirements Efficient data serving How to deal with data scarcity Video and Recurrent Neural Networks Video and Recurrent Neural Networks Technical requirements Introducing RNNs Classifying videos Optimizing Models and Deploying on Mobile Devices Optimizing Models and Deploying on Mobile Devices Technical requirements Optimizing computational and disk footprints On-device machine learning Example app ? recognizing facial expressions
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.