• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1687 Environment courses in Rotherham delivered Live Online

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered OnlineFlexible Dates
£2,975

Cognicert Root Cause Analysis Professional Course

5.0(1)

By Cognicert Limited

Root Cause Analysis (RCA) is used to analyse the root causes of focus events with both positive and negative outcomes, but it is most commonly used for the analysis of failures and incidents. Causes for such events can be varied in nature, including design processes and techniques, organizational characteristics, human aspects and external events. RCA can be used for investigating the causes of non-conformances in quality (and other) management systems as well as for failure analysis, for example in maintenance or equipment testing.

Cognicert Root Cause Analysis Professional Course
Delivered OnlineFlexible Dates
£250

CO2 Transportation From Capture to Storage and Usage

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5-days comprehensive training course provides not only an introduction into the issues associated with the development of the pipeline transportation of CO2 from its Capture, it's transportation, storage and usage but also provides an in depth understanding of the issues to be considered in the development, design and operations of these pipelines. The theme throughout this training course is CO2 Flow Assurance and Innovative Technologies. Each training day will consist of lectures in the morning and a hands-on workshop in the afternoon. The workshop allows the participants to appreciate the design process associated with CO2 transport and its operations. Various software will be available during the workshop to predict thermo hydraulics and associated phase flows through CO2 pipelines and the attached infrastructure. Further software to assess surge and environmental safety will also be available. The CO2 pipeline design approach will consider an integrated solution through modelling the CO2 capture system as well as the host storage facility. The participants will have a total appreciation of the methodology required to develop a CO2 transportation system and have an understanding of all of the Flow Assurance, risks, and operating issues and technology requirements. Training Objectives After the completion of this training course, participants will be able to: Understand the process required and identify data to analyse Flow Assurance for CO2 pipeline transport Review and Identify the Flow Assurance issues required to be evaluated for CO2 pipeline transport design and operations methodology. These include; Hydrates, Slugging, Corrosion, Scaling, Fluid Phase Behaviour and transient conditions Establish the studies to be undertaken for each area of CO2 transport including 'Rules of Thumb' and software to be used Comprehend the need for innovative methods and the technologies to mitigate Flow Assurance issues and the need for economics considerations Appreciate the need for an integrated analysis of the CO2 transport system from the CO2 capture to the host storage facility Gain an appreciation of the emerging and enabling technologies for CO2 transport and storage application Dive deeper into the operational strategies requirements to mitigate Flow Assurance issues Target Audience This training course is suitable and will greatly benefit the following specific groups: Reservoir Engineers Flow Assurance Engineers Thermodynamics Engineers Process and Chemical Engineers Pipeline Engineers Facilities Engineers Control and Subsea Engineers working in the Oil and Gas industries Engineers in other disciplines may attend that require an appreciation of CO2 pipeline transport Control and Subsea Engineers working in the Oil and Gas industries Engineers in other disciplines may attend that require an appreciation of CO2 pipeline transport Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training Course delivery: The maximum number of participants allowed for this training course is 20. A basic understanding of thermo-hydraulics would be advantageous. Morning Lectures and afternoon hands-on practical workshop. Special features: PC-based simulation software demonstration Workshop for hands-on training Course References & Additional resources: 'CO2 Transport from Capture to Storage and Usage', 1st Edition Handouts Pre & Post Assessment Trainer Your expert course leader is a renowned specialist in flow assurance management for the oil & gas field developments. His expertise enables him to support the operating and contracting companies as well as financial institutions regarding due diligence on offshore development investment decisions and associated operational system risks. Technical assessment of fields for acquisition and production enhancement opportunity. He possesses specialist expertise in evaluating difficult pipeline fluids transport such as Ethylene, Carbon Dioxide and Hydrogen through feasibility studies and technical reviews for clients. He has an exceptional academic background and natural leadership abilities are supported by practical experience of diverse projects worldwide, along with numerous publications at key conferences and publication of four books. Particular interests in developing novel and innovative technologies for subsea applications to solve difficult flow assurance problem areas and improve field development economics. He has worked on major industry projects including; Concorde aircraft fuelling system, the Channel Tunnel aerodynamics and the first deep water oil field development (Foinaven) in the West of Shetland. He is also currently developing a renewable energy solar farm and carbon neutral energy crop (Miscanthus) for domestic and commercial power generation application. He has developed in-house resources including specialist oil & gas field development evaluation software for subsea and onshore field infrastructure development options including; costing and financial analysis, reservoir viability, flow assurance assessment, subsea processing and boosting technologies, flow induced vibrations, surge analysis, heat transfer and chemical injection systems. Patents: · Subsea Seabed Power Generation for Depleting Gas fields Using Renewable Energy · Gas to Liquids Absorption Technology (GTLA) for subsea and onshore Flow Assurance applications · Subsea Gas Compressor System using pigs and liquid pumps · Pressure Boosting using water injection pumps · B&W Mentor subsea multi-phase meter · Surge suppression using a contained gas method for pipeline systems POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

CO2 Transportation From Capture to Storage and Usage
Delivered in Internationally or OnlineFlexible Dates
£3,255 to £3,785

3ds Max Basic to Intermediate Training

By London Design Training Courses

Why Choose 3ds Max Basic to Intermediate Training Course? Course info Looking to take your 3D modelling and animation skills to the next level then Our Intermediate 3DS Max course is designed to help you do just that! A bespoke course ideal for anyone who has a solid understanding of modelling in the 3D environment for films & games. Duration: 20 hrs Method: 1-on-1, Personalized attention. Schedule: Tailor your own schedule and hours of your choice, available from Mon to Sat between 9 am and 7 pm. Why Opt for Our 3ds Max Basic to Intermediate Course? Elevate your 3D modeling and animation skills with our tailored Intermediate 3DS Max course, perfect for those proficient in 3D modeling for films and games. 3ds Max Interface: Familiarize yourself with essential interface areas, tool names, and shortcuts. Master the Scene Explorer for comprehensive scene control. Learn initial software settings for an efficient workflow. Organize your project folder for streamlined work management. Enhance workflow through scene navigation shortcuts and visual styles setup. Understand scene unit configuration for precision. Foundations of 3D Modeling: Acquire industry-standard 3D modeling techniques. Implement compositing modeling with procedural geometry. Utilize non-destructive methods via Modifiers to enhance base geometries. Create 3D models using Splines and modifiers like Extrude, Sweep, and Lathe. Explore Boolean operations for complex shape creation. Delve into Mesh Modeling, enabling manual mesh editing for customized objects. Mesh Modeling: Navigate mesh modeling tools in 3ds Max. Model hard surface objects using mesh modeling and other techniques. Unleash creativity in modeling various objects. Material Creation and Application: Understand material basics and texture application. Create, apply, and resize materials on models. Utilize pictures as references for modeling. Apply multiple materials to one object. Incorporate transparency, reflection, and self-illuminating textures. Utilize images with transparency for intricate texture designs. Camera Control Techniques: Learn camera creation and viewpoint adjustment. Modify camera focal length and lock settings for stability. Adjust camera exposure for desired image brightness. Explore cameras with and without targets, understanding their differences. Lighting: Create realistic lighting using daylight systems. Fine-tune daylight settings based on geographical location. Optimize render settings for high-quality output. Utilize various light types for interior illumination. Master light distribution and apply color filters and textures. Implement HDRI environment images for realistic lighting effects. Animation Essentials: Gain a basic understanding of animation principles. Animate objects manually through keyframing. Create walkthrough animations using cameras and paths. Construct efficient camera rigs for path-based animations. Render animations as video output. Advanced Rendering Techniques: Explore rendering with V-Ray Simulate daylight systems and interior lighting in V-Ray Set up studio lighting configurations in both V-Ray advanced rendering. Course Requirements: A computer with 3ds Max and Vray installed (trial versions available on Autodesk and Chaos Group websites) Basic familiarity with 3D modeling concepts is beneficial but not mandatory Enthusiasm for learning 3ds Max and Vray to create impressive 3D models, visualizations, and animations

3ds Max Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£600

Emotional Intelligence and Me (EI & Me)

5.0(3)

By Lapd Solutions Ltd

Emotional Intelligence, EQ, EI, Moccasin Approach, Moccasin Manager,

Emotional Intelligence and Me (EI & Me)
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Recovering Troubled Projects: Virtual In-House Training

By IIL Europe Ltd

Recovering Troubled Projects: Virtual In-House Training Despite our best intentions, many of the projects that organizations undertake either don't achieve their intended business results or end in complete failure. Most seasoned project managers have had their share of experiences with difficult or troubled projects and unless they are careful, they will encounter more. This workshop does not focus on 'failed' projects but rather on those projects which without appropriate intervention would be headed for failure. Failed projects are those beyond help and which should be terminated. Here we focus on projects that are salvageable. It is an exercise-driven, no-nonsense, professional practice-focused workshop positioning the participant to immediately apply the tools and lessons learned in the classroom. The workshop employs the use of both illustrative and practical/working case studies. Illustrative case studies will examine insights from real-world troubled projects. Participants will be asked to bring descriptions of their own examples of troubled projects on which they're currently working or on which they have worked in the past. A number of these will be used as the basis for the practical/working case studies. The approach builds on and complements the disciplines addressed in Project Management Institute's PMBOK® Guide and also addresses issues that arise when managing projects in a complex environment. What You Will Learn You will learn to: Recognize the value of a structured project recovery process Explain the reasons most projects fail Analyze the causes of a project's troubles Construct a negotiation process to use with key stakeholders Apply an effective strategy to planning the recovery effort Manage, evaluate, and adjust the ongoing recovery effort Foundation Concepts Recognizing a troubled project Defining the project recovery process The Reasons Projects Fail Putting failure in perspective Reviewing management issues Analyzing planning issues Exploring complexity issues Assess the Project Stabilizing the project Determining preliminary Go / No-Go Conducting a detailed recovery assessment Negotiate the Recovery Reviewing the basics of negotiation Setting reasonable expectations Obtaining appropriate PM authority Securing key stakeholder support Plan the Recovery Planning for recoveries Rebuilding the project team Reshaping the project plan Managing parallel activities Planning for change management Implement and Adjust the Project Implementing project recoveries Facilitating change Enabling continuous learning Fostering the project team Sustaining stakeholder engagement

Recovering Troubled Projects: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Awareness of First Aid for Mental Health

By Madeleys First Aid Plus

RQF level 1 Awareness of First Aid for Mental Health Each year approximately 1 in 4 people in the UK will experience a mental health condition and at least 1 in 6 employees experience common mental health problems in the workplace. Research has shown that work is the biggest cause of stress which can stop people performing at their best. Mental health conditions are often hidden due to stigma and fear of discrimination and research has shown that a culture of fear and silence around mental health is costly to employers. The HSE guidance 'First aid needs assessment’ refers to mental health in the workplace. This 4-hour qualification provides learners with the knowledge to recognise a range of mental health conditions, how to start a supportive conversation and when and how to signpost a person to seek appropriate professional help. Learners will know how to recognise and manage stress. Learners will not diagnose or treat mental health conditions as this can only be carried out by healthcare professionals but will gain the knowledge to identify when a person may have a condition and know where they can go to get help. Suitability - Who should attend? Here are some examples of who may benefit from attending the RQF Level 1 Award in Awareness of First Aid for Mental Health: Employees and workers: This course is relevant for individuals in any industry who may encounter colleagues or clients experiencing mental health difficulties. It can be particularly valuable for human resources personnel, line managers, supervisors, or team leaders responsible for the well-being of employees. Teachers and educators: Professionals working in schools, colleges, or other educational institutions can benefit from this training to better understand and support the mental health needs of students. Healthcare and social care workers: Individuals working in healthcare or social care settings, such as nurses, care assistants, support workers, or counsellors, can enhance their understanding of mental health issues and improve their ability to provide appropriate support. Community and voluntary workers: People involved in community or voluntary organizations, including youth workers, social workers, volunteers, or community leaders, can gain valuable insights into mental health awareness and support. Personal relationships and caregivers: The Level 1 training can also be beneficial for individuals who have personal relationships with someone experiencing mental health challenges. This may include family members, friends, or caregivers who want to enhance their understanding and offer appropriate assistance. It is important to note that the Level 1 Award in Awareness of First Aid for Mental Health RQF is an introductory course and does not qualify participants to provide formal mental health interventions or therapy. However, it serves as a foundation for further training and can contribute to creating a more mentally healthy and supportive environment in various settings. Outcome / Qualification etc. Upon successful completion of the RQF Level 1 Awareness of First Aid for Mental Health course, participants can expect to achieve the following outcomes: Increased Awareness and Understanding: Participants will develop a basic awareness and understanding of mental health and mental health issues. They will gain knowledge about common mental health conditions, their signs and symptoms, and the importance of mental health in overall well-being. Recognition of Mental Health Signs: Participants will learn to recognize common signs of mental health issues in themselves and others. They will gain an understanding of the importance of early identification and intervention in promoting mental health and seeking appropriate support. Reduced Stigma and Improved Attitudes: The course aims to challenge stigmas and stereotypes associated with mental health. Participants will develop a more empathetic and supportive attitude towards individuals experiencing mental health challenges, promoting a positive and inclusive environment. Enhanced Communication Skills: Participants will learn basic communication skills for engaging with individuals experiencing mental health issues. They will gain an understanding of the importance of active listening, empathy, and non-judgmental communication in providing initial support. Signposting and Seeking Help: Participants will be equipped with knowledge about available resources, services, and support networks for mental health. They will learn about signposting individuals to appropriate professional help and self-help resources. Self-Care and Well-being Strategies: The course may provide participants with practical strategies for maintaining their own mental well-being. They may learn basic self-care techniques and stress management strategies to support their own mental health. Certificate of Completion: Upon successful completion of the course, participants will receive a certificate indicating their achievement of the RQF Level 1 Awareness of First Aid for Mental Health qualification. It's important to note that the Level 1 course provides a basic introduction to mental health awareness and first aid. It is not intended to provide participants with the qualifications or skills to diagnose or treat mental health conditions. Instead, it aims to promote mental health literacy, reduce stigma, and provide individuals with the knowledge to offer initial support and signposting to individuals in need. The Level 1 course can serve as a foundation for further learning and progression in the field of mental health. Individuals may choose to pursue higher-level courses or qualifications to develop more advanced skills and knowledge in mental health first aid or other related areas. Training Course Content MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustments • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR MENTAL HEALTH? Session content Definitions Role and responsibilities of a First Aider The impact of mental health issues Mental health stigma Statistics Session duration 25 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 25 minutes MODULE 4 PROVIDING ADVICE AND STARTING A CONVERSATION Session content How to start a difficult conversation Non-judgemental listening skills When to contact the emergency services The First Aider’s own health and emotions Session duration 40 minutes MODULE 5 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 25 minutes MODULE 6 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Session duration 70 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details Classroom-Based A minimum of 4 hours spread over at least one day. Ideally, the course should be run in one day, but must be completed within 2 weeks of starting the course, with each training session a minimum of two hours. Online/Virtual classroom The qualification has 2 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of contact hours that the learner will have with the trainer/assessor. TQT includes GLH but considers unsupervised learning and is an estimate of how long the average learner will take to achieve the qualification. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 1 Awareness of First Aid for Mental Health course, individuals can consider various progression options to further their knowledge and skills in mental health support. Here are some potential pathways: RQF Level 2 Award in First Aid for Mental Health: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of mental health issues and how to provide appropriate support. It covers topics such as recognizing mental health conditions, promoting well-being, and providing initial support to those in crisis. RQF Level 3 Award in Supervising First Aid for Mental Health: For individuals who aspire to take on leadership or supervisory roles in mental health support, the Level 3 qualification is a logical progression. It provides in-depth knowledge and skills to supervise and manage a team of individuals providing first aid for mental health. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in mental health support. Individuals can attend workshops, seminars, or conferences related to mental health, trauma, or specific areas of interest within the field. Applied Practice: Applying the knowledge gained from the Level 1 course in real-world settings is crucial for developing practical skills. Individuals can seek opportunities to work or volunteer in environments where mental health support is needed, such as community organizations, schools, or helplines. Mental Health Support Training Programs: There are various specialized training programs available that focus on specific aspects of mental health support, such as suicide prevention, trauma-informed care, or supporting individuals with specific mental health conditions. These programs can provide individuals with additional expertise and deepen their understanding of specific areas within mental health support. Higher Education: Individuals who wish to pursue a more in-depth study of mental health can consider higher education programs in psychology, counseling, social work, or related fields. These programs provide comprehensive knowledge and training in mental health support and may lead to professional certifications or degrees. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for mental health support roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.

Awareness of First Aid for Mental Health
Delivered in Much Wenlock or Online + more
£60

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered OnlineFlexible Dates
£595

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Introduction to Design Thinking: Virtual In-House Training

By IIL Europe Ltd

Introduction to Design Thinking: Virtual In-House Training Innovation is the cornerstone of highly successful companies, especially those that continue to be successful over the years and decades. Design thinking practices fuel this continual innovation, as they are the critical links from inspiration to delivery, concept to showroom floor, and start-up to global business. Design thinking is a structured approach to promoting innovation and creative problem-solving. It is not a new approach. It has been around for centuries, as the art, architecture, and inventions of mankind illustrate. By examining the steps to achieving great design and maximum utility of product, design thinking approaches provide a framework in which to develop new solutions to problems and new products to sell. This highly interactive course is designed to help participants think like designers to generate innovation, and to help teams to produce more innovation and creativity. Since design thinking is based on doing rather than thinking, we participants are challenged to apply the techniques, in the classroom, to create new ideas and solutions to a case study project. What you will Learn At the end of this program, you will be able to: Explain the underlying principles and value of using Design Thinking for innovation Describe the basic concepts of the Stanford Model for Design Thinking Evaluate a set of basic Design Thinking techniques for application to your projects Apply tools, techniques, and skills aligned with the 5 stages of the Stanford Model Drive innovation through Design Thinking at some level in your work environment Foundation Concepts Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks Stages of Design Thinking Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks General Practices Team formation Visualization Improvisation Personalization Empathize Practices Overview of Empathize techniques Observation Engagement Interviews Define Practices Overview of Define practices Unpacking techniques Defining the customer techniques Integrating the Define experience Ideate Practices Overview of Ideate practices Reusable techniques for the Ideate stage New Ideate techniques to explore Prototype & Test Practices Overview of Prototype practices Examples of prototypes Overview of Testing practices Forms of testing techniques Adopt and Adapt Design Thinking Overview of Design Thinking implementation Design Thinking implementation challenges Success in implementing Design Thinking Summary and Next Steps Workshop summary Next steps: Personal Action Plans

Introduction to Design Thinking: Virtual In-House Training
Delivered OnlineFlexible Dates
£850