• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

347 DOM courses in Newport, Gwent delivered Live Online

Mastering Angular (TT4168)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for In order to be successful in this class, incoming attendees are required to have current, hands-on experience in developing basic web applications, and be versed in HTML5, CSS3 and JavaScript. This is an intermediate level web development class, designed for experienced web developers, new to Angular, that need to further extend their skills in modern web development. Overview At the end of this five-day course, students will have an application up and running that incorporates components, directives, custom pipes, reactive forms, routes, services, unit testing, and the REST API. They will add authentication, implement the Material library, and learn how to maintain state with NgRX. They will then take a deeper dive including making their own custom directives, lazy loading modules, and E2E testing. They will learn how to enhance their application with animations and create their own Angular library. Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will learn explore: What Angular is and why should you use it How Angular reduces the amount of code that you must write to add rich functionality to both existing and new web pages What TypeScript is, why it is useful, and how to use it with Angular How to facilitate development and deployment using Angular CLI How to work with the various aspects of the Angular architecture to implement clean, responsive web interfaces How Routers can support navigation within a Single Page Application What the best practices are for using Angular so that it works unobtrusively and performs well How to use Angular with HTTP to support JSON, REST, and other services Working with the Ahead of Time compiler including its impact of developers and the development process How to defend against DOM-based XSS How to manage routing decisions based on pre-defined criteria such as a successful authentication How to meet huge data requirements by processing asynchronous data streams with RxJS Simplify server-side rendering How to facilitate unit testing Enhance an Angular user interface with animations and other advanced features Optimize Angular applications with various tools and techniques Maintain state within an Angular application What Angular 9 brings to the table and its relationship to Angular 8 Mastering Angular is a five-day, hands-on course that thoroughly explores the latest Angular features and advances, demonstrating how to solve the traditional challenges of JavaScript web application development. Throughout the course students will build custom components using application routes, form validation, and unit-testing. The course starts with an introduction of Angular CLI and TypeScript, and then delves into component-driven development with Angular components, covering data-binding, directives, services, routing, HTTP, the RxJS library, forms unit testing, and REST. Students will also learn how to add authentication, use the Material library, learn the NgRX design pattern to implement the NgRX store, make custom directives, enhance their application with animations, write an E2E test, and increase their application's efficiency by lazy loading modules and creating their own Angular library Angular Overview Overview of Angular Architecture Getting Started with Angular Getting Started with TypeScript Bootstrapping with Angular CLI Angular Project Structure Working with Angular Components and Events Third Party Libraries Dynamic Views Pipes Angular Forms Forms and the Forms API Single Page Applications and Routes Single Page Applications Services and Dependency Injection Modules Using RESTful Services Overview of REST Angular and REST Angular Best Practices Angular Style Guide What is New in Angular 9 Reactive Programming in Angular Working with RxJS Security and Authentication DomSanitizer JSON Web Tokens Route Guards Enhancing the Angular App Angular Animations Angular Material Angular Elements Deep Dive into Angular Testing and Angular Deep Dive into Components and Directives Deep Dive into Services and Dependency Injection Optimizing for the Enterprise Lazy Loading Optimizing with Universal Creating Your Own Angular Library Maintain State with NgRX NgRX Store Lesson: ES6+ Sass and SCSS for Angular and Material

Mastering Angular (TT4168)
Delivered OnlineFlexible Dates
Price on Enquiry

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)

5.0(1)

By Ember Compliance

This is a gateway course for all further learning in FD&FA systems.

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)
Delivered Online + more
£230

Level 1 Training: Domestic Abuse Awareness

By Restored

We're passionate about equipping churches to respond to domestic abuse. Our Domestic Abuse Awareness course will help you explore key questions around the issue of domestic abuse, like how to recognise the signs of domestic abuse, why domestic abuse happens, and how to start supporting survivors.

Level 1 Training: Domestic Abuse Awareness
Delivered Online + more
£30

C01M02 - FD&FA Design principles - BS 5839-1 (online)

5.0(1)

By Ember Compliance

This course will develop knowledge from the FD&FA foundation BS 5839-1 module and/or industry experience and apply this to the design of FD&FA systems.

C01M02 - FD&FA Design principles - BS 5839-1 (online)
Delivered Online + more
£230

Introduction to XML (TT4300)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level XML training course, designed for those needing an introduction to concepts and technologies associated with XML and its related recommendations. Previous experience or knowledge of HTML is helpful but not essential. Overview This course is an intensive, hands-on introduction to XML, XPath, and XSLT. The course is a balanced mixture of theory and practical labs designed to take students from the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with the fundamentals of XML, including coverage of DTDs and XML Schema. It then moves on to the XPath and XSLT standards, and how to use them to transform XML documents into other documents such as HTML documents or other XML documents. This course provides indoctrination in the practical use of W3C standards (including XSL and XML Schema) and of implementing tools and technologies. This course is programming language independent, making it useful for Java, .NET, C++, and any other programming orientation. Graduates will hit the ground running, applying XML to projects at both an architectural as well as a line by line coding level. We can easily adapt this course to industry and client specific needs.In addition to valuable knowledge and working examples, students receive a copy of the 'Xtensil' product. This unique software was developed to assist in implementing, testing, and fielding XML applications. Xtensil is used as both a teaching aid and a straightforward, basic, fully functional XML toolkit that students can use on Windows and Linux platforms. Working in a hands-on learning environment student will learn to: Write well-formed XML documents Model business requirements using XML Handle XML reserved characters Validate an XML document with a DTD and with a Schema Centralize data and markup definition with entities Create DTDs and Schemas using XML tools Generate XML documents from databases Write XSL templates to transform XML documents into HTML Integrate XML, XSL and the DOM to implement a complete solution The Extensible Markup Language (XML) is a standard that is enabling a revolution in web applications and business to business interactions. XML is the basis for Wireless Markup Language (WML), Voice Markup Language (VoiceML), Simple Object Access Protocol (SOAP), Web Services, and numerous industry initiatives such as ACORD (insurance), PXML (proposal/RFP) and OTA (travel). Introduction to XML is a three-day, hands-on course geared for software developers who need to understand what XML is and how to use in with today's systems and architectures. This course covers the topics from tags to architectures. The course is a balanced mixture of theory and practical labs designed to take students from a quick review of the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with a quick review of the fundamentals of XML before covering XML Schema in detail. It then moves on to the XPath and XSLT covering advanced topics in both. Finally, XML and Web Services security mechanisms and issues are addressed. XML Content Introduction to XML XML Mechanics XML Structure Namespaces Structure Using Schemas XML Formatting CSS and Rendering XML XSL Transformations XSLT and XPath XPath 2.0 and XSLT 2.0 Overview XSL FO (Formatting Objects) Applying XML XML Interoperability XML Performance Improvements Web Services Overview XML Applications Additional course details: Nexus Humans Introduction to XML (TT4300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to XML (TT4300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to XML (TT4300)
Delivered OnlineFlexible Dates
Price on Enquiry

C01M03 - FD&FA Installation principles - BS 5839-1 (online)

5.0(1)

By Ember Compliance

Learners will develop knowledge from the FD&FA foundation BS 5839-1 module and/or industry experience and apply this to the installation of FD&FA systems.

C01M03 - FD&FA Installation principles - BS 5839-1 (online)
Delivered Online + more
£230

22nd April Nicky Lovick #Agent121. Looking for: ADULT FICTION

5.0(2)

By I Am In Print

LOOKING FOR: ADULT FICTION Nicky Lovick has worked as an editor for over twenty years, working for top five publishers. She is now an agent at WGM Talent, building the books list. She is looking for commercial fiction, from upmarket women’s fiction, bookclub, romance, domestic noir and psychological thrillers, to crime series. She loves hooky stories such as Freida McFadden’s The Housemaid and Turn of the Key by Ruth Ware set in confined settings, such as hotels. She’s always on the lookout for romcoms with a fresh, contemporary feel to them such as Emily Henry’s Book Lovers. Also historical fiction with a twist and sweeping family sagas. Nicky wants you to make her laugh, make her cry or keep her hooked.  Nicky would like you to submit a covering letter, 1-2 page synopsis and the opening three chapters of your manuscript in a single word document.  (In addition to the paid sessions, Nicky is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 14th April 2025

22nd April Nicky Lovick #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

C01M04 - FD&FA Commissioning principles - BS 5839-1 (online)

5.0(1)

By Ember Compliance

Learners will develop knowledge from the FD&FA foundation module and/or industry experience and apply this to the commissioning, handover, and acceptance of FD&FA systems.

C01M04 - FD&FA Commissioning principles - BS 5839-1 (online)
Delivered Online + more
£230

VMware vSAN: Install, Configure, Manage [V8]

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture™ concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences

VMware vSAN: Install, Configure, Manage [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry