Discover the benefits of our EnergyEdge course focusing on prospect maturation. Enroll now to advance your knowledge in the energy industry.
REXX training course description A hands on training course covering the Restructured EXtended eXecutor (REXX) language. A large number of exercises are used to reinforce and emphasise lecture sessions. What will you learn Write REXX programs. Debug REXX programs. Examine existing code and determine its function. REXX training course details Who will benefit: Anyone wishing to learn REXX. Prerequisites: None although experience in another high level language would be useful. Duration 3 days REXX training course contents Introduction to REXX What is REXX? REXX environments, invoking a REXX exec, a sample REXX exec, REXX clause types. REXX variables and data Literal data, variable data, assignment, simple variables, compound variables, stem variables, constant data, numeric data, arithmetic operations, character manipulation, hexadecimal data. The parse instruction Parse format, Parse examples, Parse arg, Parse pull, Parse value, special templates, place holders, literal templates, numeric templates, variable templates. Control structures Relational conditions, logical operators, simple selection, looping: uncontrolled and controlled loops, infinite loops, conditional loops, controlling loops, leave, iterate, multiple selection, instructions for subroutines, exit. Sub routines and functions Internal and external subroutines, call, ARG(), ARG(n)return, exit, scope of variables, procedure, functions, built in functions, overriding built in functions. Performing I/O Command conventions, preparing to read a file, execio, limitations, execio for reading, DISKR, DISKRU, DISKW, return codes. External functions listdsi, msg, outtrap, prompt, sysdsn, sysvar, storage Tracing Immediate commands, the trace facility, signal and call statements. Built in functions Text handling functions, string handling, word handling, arithmetic, data conversion, bit manipulation, environment. The data stack Data stack structure, REXX instructions for the data stack, REXX functions for the data stack, TSO/E commands for the data stack. REXX in batch TSO/E foreground. TSO/E background.
Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.
To help address this complex and yet commonplace experience, we’ve designed a one-day workshop to help professionals who experience passive-aggressive behaviour and toxic interpersonal communication in the workplace cope more effectively. Designed to be a decisive first step into gaining control over workplace toxicity, over the course of one day, attendees will be taught to recognise patterns of passive-aggressive behaviours and will learn how to respond appropriately to it. The workshop we will work through exercises to help demystify passive-aggressiveness so that it can be rendered increasingly more harmless to those who experience it routinely. Through specially designed exercises informed by the field of Emotion Psychology and Neuroscience you will also learn how to be less affected by it without resorting to repressing your emotions and shutting down.
This course aims to assist adult learners in improving their pronunciation skills and reducing their accents to enhance their overall communication in English. Through a variety of exercises and activities, participants will focus on specific sounds, stress patterns, intonation, and rhythm to develop clearer and more fluent speech. Course Duration: 10 weeks (20 sessions) Course Objectives: By the end of this course, participants will: 1. Identify and produce accurate sounds, stress patterns, and intonation in English. 2. Develop awareness of their own pronunciation challenges and strategies for improvement. 3. Reduce their native accent to improve overall intelligibility. 4. Enhance their listening skills and ability to distinguish between different sounds. 5. Increase their confidence in spoken English communication. Course Outline: Week 1: Introduction to Pronunciation and Accent Reduction - Assessing participants' pronunciation strengths and areas for improvement - Understanding the importance of pronunciation in effective communication - Introduction to key concepts: sounds, stress, intonation, and rhythm Week 2: Vowel Sounds - Identifying and producing English vowel sounds - Practice exercises and drills for accurate vowel pronunciation - Common pronunciation challenges and strategies for improvement Week 3: Consonant Sounds - Identifying and producing English consonant sounds - Focus on challenging consonant sounds and their correct articulation - Practice exercises and drills for accurate consonant pronunciation Week 4: Word Stress and Sentence Stress - Understanding the concept of stress and its role in English pronunciation - Practice exercises for placing stress on the correct syllables in words and sentences - Intonation patterns in different sentence types Week 5: Rhythm and Linking - Developing a sense of rhythm in English speech - Practice exercises for linking words together and maintaining flow - Awareness of connected speech phenomena Week 6: Intonation Patterns - Recognizing and producing different intonation patterns in English - Practice exercises for conveying meaning through intonation - Intonation in questions, statements, and emotions Week 7: Pronunciation of Commonly Mispronounced Words - Identification and correction of commonly mispronounced words - Practice exercises for improving pronunciation of specific words - Strategies for self-correction and continued improvement Week 8: Accent Reduction Techniques - Understanding the impact of native accents on English pronunciation - Techniques for reducing native accents and improving intelligibility - Practice exercises for adopting a more neutral accent Week 9: Listening Skills and Discrimination - Enhancing listening skills to better distinguish between sounds - Practice exercises for recognising and discriminating between similar sounds - Developing an ear for correct pronunciation through listening activities Week 10: Review and Fluency Practice - Reviewing course content and addressing individual needs - Fluency practice exercises and activities - Final evaluation and feedback session Note: This syllabus is a guideline and can be customised based on the specific needs and preferences of the participants. You can opt in and out of different modules.
A truly UNIQUE Dance Photography Workshop 12 dancers, 12 photographers, working on location, in the photography studio and live in the theatre - you will come out buzzing!
Discover Power BI business data analytics through EnergyEdge's course. Enhance your skills and gain valuable insights for your business.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
The Gottman Method is a research-based approach to couples therapy that enhances intimacy and friendship while constructively addressing conflicts. Developed by Drs. John and Julie Gottman, this method includes practical exercises to improve communication and strengthen relationships. Key areas: intimacy, friendship, conflict resolution, communication skills, John Gottman, Julie Gottman 3 x 1 hour sessions