• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8203 FEEL courses

React Bootcamp with .NET API (Router, Redux Toolkit, Hooks)

By Packt

This comprehensive course is designed to take you on a journey of mastering React, the popular JavaScript library for building dynamic user interfaces, and combining it with the power of .NET API for seamless back-end integration. This course will provide you with a solid foundation and hands-on experience in building full-stack applications.

React Bootcamp with .NET API (Router, Redux Toolkit, Hooks)
Delivered Online On Demand22 hours 20 minutes
£82.99

Bereavement and Grief Counselling Online Course

3.0(2)

By Alpha Academy

Bereavement and Grief Counselling Online Course Do you wish to start the process of pursuing a job as a bereavement counsellor? Have you ever lost a loved one to death, or do you know someone who has? Do you wish to assist or counsel someone who is experiencing grief? The course on Bereavement and Grief Counselling focuses on death and loss and then discusses how it affects people. After completing the course, you will be equipped with the knowledge and experience necessary to comprehend, assist, and deal with people who are grieving a death or other significant loss. Taking this Bereavement and Grief Counselling course would be extremely beneficial if you are already a professional counsellor and work with bereaved clients. In other words, everyone who might be experiencing troubles with loss and grieving may benefit from your service. A grief counsellor’s primary responsibility would be to assist and support a person who is grieving as they move through the phases of grief without any difficulties. The counsellor would assist the person in acknowledging their loss and discussing how they feel to help them get through the mourning process without any problems. Course Curriculum Module 01: Concept of Counselling Module 02: Bereavement and Grief in Life Module 03: When Does Grief Begin? Module 04: Effect of Sudden Death Module 05: Mourning Specific Losses Module 06: Complicated Grief Reactions Part 1 Module 07: Complicated Grief Reactions Part 2 Module 08: Special Issues in Grief Module 09: Children and Grief Module 10: Professional Help for Adults Module 11: Grief Counselling and Grief Resolution Module 12: Ethical Issues in Grief Counselling Practice (Learn more about this online course)

Bereavement and Grief Counselling Online Course
Delivered Online On Demand2 hours
£10.99

Complete Communication Skills Master Class for Life

3.0(2)

By Alpha Academy

Want to speak with confidence, connect with others easily, and express your thoughts clearly? This Complete Communication Skills Master Class is your guide to doing just that. Whether you’re talking in meetings, speaking on stage, or making new friends, this course helps you master the art of clear and effective communication. Learning Outcomes Understand what makes communication effective Learn to talk to anyone with ease Master the art of storytelling Improve your public speaking skills Build influence and connect with others Who is this for? This course is for anyone who wants to become a better speaker in everyday life, at work, or on stage. Whether you are a student, job seeker, manager, business owner, or simply someone who wants to connect better with others, this course is made for you. You don’t need any special skills or background—just the desire to learn and grow. Career path Completing this course can open doors to roles that require strong speaking and listening skills. You'll feel more confident in interviews, workplace discussions, meetings, and public events. Better communication helps in almost every job. Prerequisites No previous experience is needed. This course is open to learners of all levels. You just need a willingness to learn, a good internet connection, and basic English reading and listening skills.capabilities. Certification Upon completion of the course and passing the final assessment, you can obtain a PDF certificate for £9.99. Hard copy certificates are available for an additional £15.99. Disclaimer: This is an online course with pre-recorded sessions. Course access will be granted within 24 hours of enrollment. (Learn more about this online course)

Complete Communication Skills Master Class for Life
Delivered Online On Demand5 hours
£10.99

DOG WALKING SERVICE

5.0(84)

By Cheshire Dog Services Ltd

One of the best things in life is having a healthy, happy dog but sometimes our lifestyles are unable to provide what your “best friend” needs. The stimulation achieved from walking and exercising your dog provides much more benefit than outside space alone can, so if, for whatever reason you cannot afford the time because of work or other commitments may have, we can step in and walk your dog for you. Cheshire Dog Services will collect your dog in our fully ventilated vehicle, which has individual cages for your dog’s safety. Following a good walk, we will return your dog back to your home, happy, socialised and tired. If you’re looking for a dog walker… GET IN TOUCH If you have ever seen any of the TV shows relating to dog behaviour, you will know that walking is so essential to your dog’s wellbeing. They need both mental and physical stimulation and lack of these stimuli can often result in behavioural problems such as barking, chewing or just general nuisance behaviour, which is not what you want from your dog. During our daily walks your dog can do what dogs want to do, they will get the chance to have a really good run around whilst socialising with us and the other dogs. The locations/routes taken are varied so that the walks always remain interesting. Walking your dog in a pack could therefore provide a good proportion of the social interaction and physical exercise your dog requires to have a well-balanced disposition. We can walk either on the lead or simply allow them to run free; it depends on what your dog needs & what you instruct us to do. Your dog should then return home happy, tired and just about ready for a good rest! Prior to your dog’s first walk, we will come and meet him /her to get to know the character whilst at the same time allowing you to ask any questions you may have. All dogs will undergo a free assessment prior to joining Cheshire Dog Services. This places you under no obligation, just the opportunity to meet us before you make any decisions. If you wish to go ahead with our walking service, your dog may then be walked on a one to one basis for the first few walks, just so we can get to know your dog a little better and gauge how your dog reacts in different situations. We will then suggest that your dog would be suited to one of the following. Walking in a “pack” with dogs of a similar temperament or breed, which will help to socialise & stimulate your dog. We walk no more than five dogs at once but prefer a maximum of four smaller breed or three larger breed dogs as we feel this is the number that allows us to give them the attention they need and for their safety and confidence too. OR Recommend for ‘1 to 1 walks‘. Any issues that arise will be discussed with you in detail. We recognise that all dogs are different and have individual needs, so our descriptions are used as a guide only. We can personalise any of our services to suit your (or your dog’s) requirements so if you don’t find exactly what you are looking for or have any questions, CONTACT US and we will do our very best to meet your needs. We are able to offer special rates if you would like us to look after additional dogs from the same household and weekly bookings. Cheshire Dog Services are DBS certified and fully insured. Please contact us for prices (they vary depending on what’s required)

DOG WALKING SERVICE
Delivered OnlineFlexible Dates
Price on Enquiry

Overview of Art Therapy Course Art therapy is becoming more popular as people understand the importance of mental health. In the UK, over 1.6 million people receive psychological therapies through the NHS every year. Our Art Therapy Course is designed to help learners use art to support people who are dealing with trauma, anxiety, or emotional stress. This course shows how creative activities can help people feel better and find new ways to express themselves. The Art Therapy Course covers many useful topics. You will learn how the brain works, how art affects emotions, and how to support children, adults, and families through creative methods. The course also includes mindful art techniques, reflective writing, and therapeutic drawing. These tools are used by professionals to help people open up and feel calm. With this course, you can learn how colour, shapes, and drawing can support mental wellbeing. In the UK, the demand for art therapists is growing. Private sessions can cost between £50 and £120 an hour. After finishing the Art Therapy Course, you can work in schools, the NHS, care homes, or even run your therapy sessions. This Art Therapy Course helps you build a strong foundation to support others through creativity. Whether you're starting a new career or adding to your skills, the Art Therapy Course is a great way to learn how art can heal. Learning Outcomes By the end of this Art Therapy Course, learners will be able to: Understand the basic ideas behind art therapy and how it connects to mental health. Use simple brain science to guide helpful creative therapy sessions. Try mindful art techniques using colour and creative expression. Apply art therapy with children, adults, and families in different situations. Use drawing and reflective writing to support emotional healing. Plan and design full art therapy sessions for different groups. Who is this course for? This Art Therapy Course is for anyone who wants to use creativity to support others: Healthcare workers who want to bring creative ways to help patients deal with stress, trauma, or emotional struggles. Teachers and school staff who want to use art therapy to support students with stress, behaviour, or emotional needs. Care workers in community centres, care homes, or hospices who want to help people through creative and calming activities. Anyone interested in mental health and creativity, who wants to use art therapy for personal or family wellbeing. People changing careers who are thinking about working in mental health and want a strong starting point. Process of Evaluation After studying the Art Therapy Course Course, your skills and knowledge will be tested with an MCQ exam or assignment. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Art Therapy Course Course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. (Each) Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. (Each) Shipping Charges: Inside the UK: £3.99 International: £10.99 Requirements You don’t need any educational qualification or experience to enrol in the Art Therapy course. Career Path Completing this Art Therapy Course can lead to many rewarding roles, such as: Art Therapist – £25,000 to £45,000 a year Mental Health Support Worker – £18,000 to £28,000 a year Therapeutic Activities Coordinator – £20,000 to £32,000 a year Community Wellbeing Facilitator – £22,000 to £35,000 a year Children’s Art Therapy Assistant – £19,000 to £30,000 a year Course Curriculum: Module 01: Introduction to Art Therapy Introduction to Art Therapy 00:17:00 Module 02: Art Therapy: Psychology and Neuroscience Art Therapy: Psychology and Neuroscience 00:18:00 Module 03: Art Therapy in Practice Art Therapy in Practice 00:18:00 Module 04: Creative Therapy Creative Therapy 00:14:00 Module 05: Mindful Creativity: Colour and Creation Mindful Creativity: Colour and Creation 00:17:00 Module 06: Art Therapy Techniques and Applications Art Therapy Techniques and Applications 00:34:00 Module 07: Using Mindfulness in Art Therapy Using Mindfulness in Art Therapy 00:26:00 Module 08: Drawings Drawings 00:35:00 Module 09: Reflective Writing Reflective Writing 00:22:00 Module 10: Art Therapy for Children Art Therapy for Children 00:21:00 Module 11: Art Therapy for Adults Art Therapy for Adults 00:18:00 Module 12: Art Therapy for Family Art Therapy for Family 00:33:00 Module 13: Illness and Art Illness and Art 00:15:00 Module 14: The Art Therapist The Art Therapist 00:20:00

Art Therapy
Delivered Online On Demand5 hours 8 minutes
£11.99

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

0G53BG IBM SPSS Statistics Essentials (V26)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for New users of IBM SPSS Statistics Users who want to refresh their knowledge about IBM SPSS Statistics Anyone who is considering purchasing IBM SPSS Statistics Overview Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders Additional course details: Nexus Humans 0G53BG IBM SPSS Statistics Essentials (V26) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G53BG IBM SPSS Statistics Essentials (V26) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

0G53BG IBM SPSS Statistics Essentials (V26)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry

Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This introduction to Spring development course requires that incoming students possess solid Java programming skills and practical hands-on Java experience. This class is geared for experienced Java developers who are new to Spring, who wish to understand how and when to use Spring in Java and JEE applications. Overview Working in a hands-on learning environment, led by our expert practitioner, students will: Explain the issues associated with complex frameworks such as JEE and how Spring addresses those issues Understand the relationships between Spring and JEE, AOP, IOC and JDBC. Write applications that take advantage of the Spring container and the declarative nature of assembling simple components into applications. Understand how to configure the Spring Boot framework Understand and work on integrating persistence into a Spring application Explain Spring's support for transactions and caching Work with Spring Boot to facilitate Spring setup and configuration Apply Aspect Oriented Programming (AOP) to Spring applications Become familiar with the conditionally loading of bean definitions and Application Contexts Understand how to leverage the power of Spring Boot Use Spring Boot to create and work with JPA repositories Introduction to Spring Boot | Spring Boot Quick Start is a hands-on Spring training course geared for experienced Java developers who need to understand what the Spring Boot is in terms of today's systems and architectures, and how to use Spring in conjunction with other technologies and frameworks. This leading-edge course provides added coverage of Spring's Aspect-Oriented Programming and the use of Spring Boot. Students will gain hands-on experience working with Spring, using Maven for project and dependancy management, and, optionally, a test-driven approach (using JUnit) to the labs in the course. The Spring framework is an application framework that provides a lightweight container that supports the creation of simple-to-complex components in a non-invasive fashion. Spring's flexibility and transparency is congruent and supportive of incremental development and testing. The framework's structure supports the layering of functionality such as persistence, transactions, view-oriented frameworks, and enterprise systems and capabilities. This course targets Spring Boot 2 , which includes full support for Java SE 11 and Java EE 8. Spring supports the use of lambda expressions and method references in many of its APIs. The Spring Framework Understand the value of Spring Explore Dependency Injection (DI) and Inversion of Control (IoC) Introduce different ways of configuring collaborators Spring as an Object Factory Initializing the Spring IoC Container Configuring Spring Managed Beans Introduce Java-based configuration The @Configuration and @Bean annotations Define bean dependencies Bootstrapping Java Config Context Injection in Configuration classes Using context Profiles Conditionally loading beans and configurations Bean Life-Cycle Methods Defining Bean dependencies Introduce Spring annotations for defining dependencies Explore the @Autowired annotation Stereotype Annotations Qualifying injection points Lifecycle annotations Using properties in Java based configuration The @Value annotation Using the Candidate Components Index Introduction to Spring Boot Introduce the basics of Spring Boot Explain auto-configuration Introduce the Spring Initializr application Bootstrapping a Spring Boot application Working with Spring Boot Provide an overview of Spring Boot Introduce starter dependencies Introduce auto-configuration @Enable... annotations Conditional configuration Spring Boot Externalized Configuration Bootstrapping Spring Boot Introduction to Aspect Oriented Programming Aspect Oriented Programming Cross Cutting Concerns Spring AOP Spring AOP in a Nutshell @AspectJ support Spring AOP advice types AspectJ pointcut designators Spring Boot Actuator Understand Spring Boot Actuators Work with predefined Actuator endpoints Enabling Actuator endpoints Securing the Actuator Developing in Spring Boot Introduce Spring Boot Devtools Enable the ConditionEvaluationReport Debugging Spring Boot applications Thymeleaf Provide a quick overview of Thymeleaf Introduce Thymeleaf templates Create and run a Spring Thymeleaf MVC application Additional course details: Nexus Humans Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Spring Boot Quick Start | Core Spring, Spring AOP, Spring Boot 2.0 and More (TT3322)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry