SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.
Mediation Assessment and a session with each partner Analyse relationship history Resolve communication issues Eliminate present issues Implement a new strategy of communication Exercise a plan of compromise Resolution Open talk hearing both perspectives 4 sessions (1 privately with each party, 3 together) 1 hour x 4 https://relationshipsmdd.com/product/i-want-to-spend-more-time-with-my-kids-but-my-ex-is-reluctant-package/
Trust building Pain point assessment Relationship history analysation Communication strengthening Ascertain main problem areas Closure on reoccurring arguments Intervention and mediation Emotional intelligence training Love language assessment Resolving fights Private assessments with each individual 3 couples therapy sessions https://relationshipsmdd.com/product/couples-trust-building-and-communication-therapy-package/
About this Training Course This 5 full-day course has been designed to develop skills in understanding the geometry and petrophysical characteristics of carbonate reservoirs. Depositional fabric, grain type and size and subsequent diagenetic modifications are the major controls on carbonate reservoir behaviour. The complex inter-relationship of the depositional and burial history can be unravelled to allow prediction of reservoir facies and reconstruction of three-dimensional reservoir models. This course will demonstrate the value of the reservoir model in volumetric assessment and development of carbonate reservoirs. *Previous knowledge of carbonate sedimentology is not required. Course Content in Summary: Carbonate reservoirs: Basic principles; depositional concepts; grain types; textures and fabrics; environmental reconstruction. The reservoir model - depositional and diagenetic characteristics: Sabkha/tidal flat; lagoon; shelf; reef (rudist and coral/algal); barrier/shoal; slope and redeposited; aeolian and lacustrine; karst plays. Carbonate diagenesis: Primary and secondary porosity; compaction; pressure solution; cementation; dolomitisation; porosity generation and destruction; fractures. Carbonate sequence stratigraphy Log response in carbonate rocks: Gamma; sonic; neutron; density; FMS. Reservoir assessment: Fracture reservoirs; reservoir modelling; volumetric assessment in correlation and mapping; effects of capillary pressure; interface with engineering. Training Objectives By attending this course, participants will be able to: Understand carbonate depositional systems and controls. Recognise and model controls on reservoir quality and pore systems, including diagenesis and fracturing. Understand and apply carbonate seismic stratigraphy and sequence stratigraphy. Interpret log responses. Target Audience This course is intended for petroleum geologists, explorationists, petrophysicists, geophysicists and engineers involved with exploration of carbonate plays and development of carbonate reservoirs. Trainer Your expert course leader is a Director and Senior Consultant Geologist who has worked on various carbonate consultancy projects, conducted detailed sedimentological, sequence stratigraphic and diagenetic technical studies and delivered training programmes. He was formerly Managing Director of Robertson UK Limited and was responsible for the integration between different disciplines, recognition, and encouragement of technical innovation and research and development programmes across all oil and gas divisions in the company. He was also responsible for all aspects of the performance of the main Geological, Geophysical and Reservoir Engineering Services in the company. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
This Foundation Course is designed to explore yoga in more depth. This course is not only an opportunity to expand on the practices that you cover in your general classes but also a chance to dig deeper and learn more about this great and vast practice that is YOGA.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.
Scrum Master Workshop: In-House Training: Virtual In-House Training A Scrum Master helps project teams properly use the Scrum framework, increasing the likelihood of the project's overall success. Scrum Masters understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers. Scrum Masters act as 'servant leaders', helping the rest of the Scrum Team work together and learn the Scrum framework. Scrum Masters also protect the team from both internal and external distractions. What you will Learn You'll learn how to: Comprehend the Agile Manifesto and mindset Explain the fundamental principles of Scrum Guide the Scrum team in their responsibilities Write requirements in the form of user stories Define Ready and Done Estimate using planning poker and prioritize using MoSCoW Facilitate the team through the 5 Sprint events Fulfill the role of Scrum Master in a Scrum project Create Information Radiators to enable transparency Define the structure of the retrospective Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum events Scrum artifacts Scrum Roles and Responsibilities Product Owner responsibilities Scrum Master responsibilities The Team responsibilities Cross-functional Teams Building Effective Teams The Product Backlog and User Stories The Product Backlog User Stories Definition of Done Backlog grooming Estimating User Stories Story points, planning poker Prioritizing User Stories The Sprint Team capacity and velocity The Sprint Planning Meeting The Sprint Backlog The Sprint Learning to self-manage, self-organize, self-improve Sprint Review and Retrospective Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content
Introduction to Asthma in Primary Care This 2-Day Introduction to Asthma course is specifically designed for healthcare professionals in primary care settings. It provides a comprehensive overview of asthma management, from diagnosis to ongoing patient care. This interactive course is ideal for those new to asthma care or looking to refresh their knowledge. Day 1 focuses on the fundamentals of asthma, including its definition, the importance of a good clinical history, and diagnostic tests. It covers the diagnosis of asthma in children and explores various asthma guidelines. The day concludes with an in-depth look at inhaler types, techniques, and considerations in choosing inhalers, followed by action plan development. Day 2 builds on the previous day's learnings, with a focus on monitoring asthma, conducting asthma reviews, and creating Personalised Asthma Action Plans (PAAPs). Participants will learn about assessing and managing asthma attacks and review the National Register of Asthma Deaths (NRAD) for insights into asthma management. The course concludes with case studies and discussions to solidify the learning experience. Learning Objectives: 1. Understanding Asthma a. Develop a fundamental understanding of what asthma is. b. Learn the importance of obtaining a thorough clinical history for accurate diagnosis. 2. Diagnostic Approaches a. Understand various tests used to confirm an asthma diagnosis. b. Learn about diagnosing asthma in children. 3. Guidelines and Inhaler Techniques a. Familiarise with key asthma guidelines: BTS/SIGN, NICE, and GINA. b. Gain practical knowledge about commonly used inhalers and their techniques. 4. Treatment and Management a. Explore factors influencing the choice of inhalers. b. Develop skills in creating effective asthma action plans. 5. Asthma Monitoring and Reviews a. Learn methods to monitor asthma effectively in patients. b. Understand how to conduct thorough asthma reviews. 6. Personalised Asthma Action Plans a. Learn how to develop and implement PAAPs tailored to individual patients. 7. Assessing and Managing Asthma Attacks a. Understand how to assess the level of asthma attacks and manage them appropriately. 8. Insights from NRAD a. Review findings from the National Register of Asthma Deaths for improved asthma care.Target Audience:This course is designed for nurses and healthcare professionals new to asthma care, providing them with the knowledge and skills to confidently manage patients with asthma in a primary care setting. All practitioners seeking to enhance their expertise in asthma care are welcome to attend.
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
Duration 2 Days 12 CPD hours This course is intended for Managers, directors, and other professionals responsible for planning and leading projects and programs will benefit from this course. Overview Describe common communication barriers Understand how to use effective interpersonal skills in their spoken and written communications Analyze the pillars of organizational awareness Apply principles of effective facilitation Understand how to adapt their approach to different learning and communication styles Effective communication is how employees and management interact to reach organizational goals. Getting this right results in a happier, more engaged workforce who get more done. Unfortunately, there are often significant barriers ? language, culture, distrust, distance ? to effective communication. The activities and discussions in this workshop will help you identify the essential elements of effective communications within your organization and develop communication strategies that harness both interpersonal and organizational awareness to build trust, strengthen collaboration, and increase productivity. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. A History of Organizational Communication A Historical Perspective Classic vs. Human Relations Communications Generational and Technological Change Digital Communication Effectiveness of Communication Channels 2. The Effectiveness of Interpersonal Skills Limitations of Self-Awareness Transactional Analysis Connecting with Powerful Communication Active Listening Non-Verbal Communication Written Communication The Power of Facilitation 3. The Pillars of Organizational Awareness Culture and Behavior Creating Psychological Safety Inclusion and Belonging Sweaty-Palmed Conversations Care and Challenge Each Other 4. The Adaptation of Communication Strategies Factors in Communication Communication Barriers Adapting to Different Learning and Communication Styles Communication Strategies Across Time Position and Posture Additional course details: Nexus Humans Communicating Across Your Organization (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Communicating Across Your Organization (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.