• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

260 Educators providing Identity courses delivered Online

azure trainings

azure trainings

In the fast-paced world of technology, cloud computing skills are increasingly essential. Microsoft Azure, a leading cloud platform, offers a vast array of services that empower organizations to build, deploy, and manage applications efficiently. For IT professionals aiming to advance their careers, optimize their company's IT infrastructure, or keep up with the latest industry trends, Azure training is a critical investment. WHY CHOOSE AZURE? Azure stands out among cloud platforms for several reasons: 1. Scalability and Flexibility: Azure's infrastructure can scale to match your workload, providing cost-efficiency and flexibility. 2. Security: Azure boasts top-tier security measures and compliance certifications, ensuring robust protection for your data and applications. 3. Global Reach: Azure’s global network of data centers ensures high availability and low latency. 4. Comprehensive Services: From virtual machines to advanced AI and machine learning, Azure offers a wide range of services to meet diverse business needs. 5. Seamless Integration: Azure integrates smoothly with other Microsoft products, creating a cohesive ecosystem for businesses. THE IMPORTANCE OF AZURE TRAINING Azure training equips you with the skills and knowledge to effectively leverage Azure services. Key benefits include: 1. Career Advancement: Cloud computing expertise is in high demand, and Azure certification can enhance job prospects and earning potential. 2. Operational Efficiency: Proficiency in Azure allows you to optimize your organization’s cloud infrastructure, leading to cost savings and improved performance. 3. Driving Innovation: Azure training enables you to harness cutting-edge technologies like AI, machine learning, and IoT, fostering innovation. 4. Enhanced Security and Compliance: Proper training ensures you can implement Azure's security features effectively, maintaining compliance with industry standards. KEY COMPONENTS OF AZURE TRAINING Azure training covers a wide range of topics and expertise levels. Here are the essential components: 1. FUNDAMENTALS Azure Fundamentals (AZ-900): Ideal for beginners, this entry-level certification covers the basics of cloud computing and introduces Azure services, pricing, and support. Key topics include: * Core Azure services (compute, networking, storage, and databases) * Basic cloud concepts (public, private, and hybrid cloud) * Azure pricing and support plans * Security, compliance, and trust in Azure 2. ASSOCIATE LEVEL Azure Administrator (AZ-104): Designed for professionals responsible for managing Azure subscriptions, implementing storage solutions, and managing virtual networks. Key topics include: * Managing Azure identities and governance * Implementing and managing storage * Deploying and managing Azure compute resources * Configuring and managing virtual networking * Monitoring and maintaining Azure resources Azure Developer (AZ-204): This certification focuses on designing, building, testing, and maintaining cloud applications and services on Azure. Key topics include: * Developing Azure compute solutions * Developing for Azure storage * Implementing Azure security * Monitoring, troubleshooting, and optimizing Azure solutions * Connecting to and consuming Azure services and third-party services 3. EXPERT LEVEL Azure Solutions Architect (AZ-305): For experienced IT professionals who design solutions on Azure, this certification covers advanced topics such as: * Designing for identity and security * Designing a data platform solution * Designing for deployment, migration, and integration * Designing an infrastructure strategy Azure DevOps Engineer (AZ-400): Targeting professionals who combine people, processes, and technologies to deliver continuous value, this certification covers: * Designing a DevOps strategy * Implementing DevOps development processes * Implementing continuous integration and delivery * Implementing dependency management * Implementing application infrastructure * Implementing continuous feedback HANDS-ON LABS AND REAL-WORLD PROJECTS Azure training programs often include hands-on labs and real-world projects to reinforce theoretical knowledge and gain practical experience. Through these components, you can: * Deploy and manage virtual machines * Configure and manage Azure networking * Implement and manage Azure storage solutions * Develop and deploy Azure applications * Automate tasks using Azure DevOps and other tools CERTIFICATION PATHWAYS Azure certifications are structured to provide a clear learning path. Starting with fundamentals, you can progress to associate and expert levels, aligning your training with your career goals. Each certification requires passing specific exams, and Microsoft offers a wealth of resources to help you prepare, including: * Official Microsoft learning paths * Instructor-led training courses * Practice exams * Online tutorials and documentation STAYING UPDATED Azure is a constantly evolving platform with frequent updates and new services. To stay current, consider the following: * Regularly review Azure updates and release notes * Participate in Azure webinars and online communities * Subscribe to Azure blogs and newsletters * Engage in continuous learning through advanced courses and certifications CONCLUSION Azure training is a valuable investment in your professional development. Whether you are an aspiring IT professional, a seasoned administrator, or a developer seeking to expand your skill set, Azure offers numerous opportunities to grow and innovate. By obtaining Azure certifications and gaining hands-on experience, you can position yourself as a cloud expert and drive significant value within your organization. Begin your Azure training journey today and unlock the full potential of cloud computing!

Lion King Shirt: A Brand That Helps You Honor Your Family Legacy

lion king shirt: a brand that helps you honor your family legacy

Family forms the heart of our lives - we all know this. They raised us, educated us, gave us the memories and traditions that define who we are. Yet, as we grow up and have our own paths, modern life can weaken those family bonds. That’s why you have to make some genuine effort to preserve them. And that’s where the brand Lion King Shirt [https://lionkingshirt.com] comes in. As a famous POD T-shirt brand, this store has served so many families over the years, and they all share the same love and reverence for each other. The team commits to creating custom POD T-shirts that are centered around your family. From reflecting your lineages, to celebrating your memories, the brand’s talented designers make sure that your bond echoes for generations. LION KING SHIRT EXPLAINS: HOW POD T-SHIRTS HAVE BONDED FAMILIES IN AMERICA 1. Creating A Sense Of Belonging By wearing custom T-shirts together at reunions and holidays, you can reconnect the whole family, even families that have fallen out of touch for a long time. It is only natural: once all the members have united under the same fabric, it builds a sense of pride in your heritage, nurturing new and old bonds alike. Though times will change, these special T-shirts remind you of your shared roots, which run deeper than anything. No matter what your name is, where you come from or how you look, you are united by blood. By ordering a simple T-shirt design that says, “The Anderson family” or something, you remind all the members that their lives are sewn together, by invisible threads that far outlive the human memory. 2. Preserving Memories Through Clothing Not all families stay together through the years. In America, children usually move out when they’re 18, and only come back home once in a while. All the more reasons for your family to have some custom T-shirts, so your bond can transcend space and time. For example, when you send a POD T-shirt to a child studying overseas, that shirt is not just fabric anymore. It becomes a living archive of memories; it ensures that your kid has something to remember his or her roots. As they look at the design in the mirror, they’re instantly taken back to their first baby steps, and taken through a long path of memory. POD T-shirts can bring your folks together like never before. 3. Strengthen The Family Identity This usually applies to families with more “unique” traditions and identity. For instance, if you’re born in Texas, and your come from a long line of shepherds, a POD T-shirt with a sheep will certainly tug on your heartstrings. Thanks to T-shirts with unique symbols and elements, you can represent the intangible, yet unbreakable bonds in your family. The bond can be anything: from natural scenery, to names and dates, to images of your shared dreams. These T-shirts are much more than fleeting trends. They are the chronicles of your folks’ traditions, values and ideals. HONOR YOUR FAMILY WITH LION KING T SHIRT DESIGNS AND CUSTOMIZATION 1. Designs That Reflect Family Heritage And Legacy If you want to create designs that represent your proud family, then you’re in luck. In this famous POD T-shirt brand, there is a vast and diverse array of options to honor your lineage. Buckle up, you’re about to go through quite a trip! In the category for family, the brand offers so many types of T-shirts that visualize the dates, triumphs, histories, landscapes and ideals from many family generations. When you browse the website, you can choose among thousands of options. There are T-shirts of pioneers settling in Texas, or the forefathers that build the first bricks of Washington D.C. There are no limits to this reputable brand. You can even design and customize a T-shirt on your own. The brand offers a customized page on the website that is very easy to understand. You can add photos of your family, the important dates and years, or a familiar holiday attraction you used to visit. Anything you need to make your legacy immortal, Lion King Shirt has got it. 2. Honoring The Loved Ones Who Have Left So Soon When it comes to family, there is a very sensitive topic that few brands dare to touch: grief. Thankfully, Lion King T Shirt [https://bento.me/lionkingshirt] empathizes with this pain, and turns it into beautiful designs. Every family has been through grief at least once. Many kind souls have been called to heaven too soon; they never had a chance to meet younger generations. Thanks to customized T-shirts from this brand, you can commemorate the loved ones who have left. If you have any old photos, don’t hesitate to send them over. The brand’s talented designers will try their best to restore those pictures to HD resolution, then print on the best type of fabric. With these designs, every member in your family can say their farewells and have a proper closure. Even the young kids can know about the ones who have passed, and learn about their lifetime passions and talents. As you can see, T-shirts are not just for our material needs, they help spread our blessings to the spiritual world too. With this sacred service, the brand makes sure that your loved ones will stay in your heart, giving you strength and bravery every day. With POD designs, your loved ones will always be with you. 3. Helping You Make New Memories But POD T-shirts are not just for replicating history. The brand has some very vibrant and creative designs, allowing you to create new and modern memories with your family. For example, if someone in the house is getting married, don’t miss this chance! Come down to the brand’s website and start ordering a wedding design. You can add as many elements as you want, from flowers to chocolates to rings. Or if a member’s expecting a child soon, go ahead and print the toddler’s name and sonograph. The same goes for anniversaries, holidays, and everything in between! Because the designing and printing process is so quick, the brand can make sure you won’t miss a beat in celebrating your family’s events. As the years go by, you can add the many T-shirts to a wardrobe, then look back to see how much the family has blossomed. OTHER LION KING TEE SHIRTS SERVICES FOR YOU AND YOUR FAMILY 1. Caring Customer Services Here in this brand, there’s an entire team of staff, and they commit their full time to make sure your family feels respected, supported and uplifted throughout each experience. To be specific: on regular work days, the team keeps all of their contact channels up and active, so all of your questions will be answered in a matter of hours, and definitely not longer than a day. No matter who you are: a grandparent looking to surprise their grandkids, or a young boy doing something nice for their parents, they answer you with diligence, politeness and honesty. Should any surprises happen, the team rushes at it with patience and empathy. Here at this brand, each and every staff has been trained to uplift the customers, far beyond the objective of profit. Once they’ve committed to their buyers’ wellbeing and benefits, all other success will follow. Dear families in America, you can rest assured that this POD brand has got you covered. They consider it their personal mission to fulfill your order, as if they were taking care of their own family. 2. Transparent Policies For Peace Of Mind In Lion King Tee Shirts [https://kikoxp.com/lion_king_shirt], the team understands that there are customers of all ages, and they might not be aware of the policies in a POD brand. That’s why the brand has publicized all of their policies on the website, crystal-clear for the world to read. The team understands that POD T-shirts are a very special type of goods. They’re produced in a non-traditional way, so their shipping times and quality are erratic too. So if your order is damaged, mistaken, or otherwise different from what you want, please contact the brand immediately. They can offer you plenty of solutions, from refund to replacement. There are crystal-clear policies to help you get the T-shirts. 3. Secure Payment And Easy Tracking Finally, the team takes security very seriously. Because the entire purchase process is made online, many people are concerned for their privacy, especially your grandparents and parents. To make sure your family feels safe and secure, the brand has applied many precautions to protect your payment info from falling into the wrong hands. On the website, you can see some very straightforward policies, stating that no third party can see your credit card numbers. That way, you and your families can go shopping with confidence, and create awesome T-shirts that accurately reflect your lineage. FINAL VERDICT In the fast-moving world of today, family relationships are easily affected, and threatening what we cherish most. Thankfully, with the POD brand Lion King Shirt, you can revive traditions, create memories and unite your family for life. From your kids to your grandparents, your whole family can receive unique T-shirts that enrich their lives and protect their memories.

Paradigm Arts

paradigm arts

Lincoln

Over the last twenty years I have worked tirelessly to develop a methodology and an infrastructure for partner agencies, cultural organisations, artists, practitioners and schools, to provide children and young people with access to a high quality offer of Arts and Cultural experiences. I have developed arts and cultural strategy for local authorities, been responsible for the development and successful delivery of large arts and cultural events and I have advised national agencies on the development of strategic resourcing and programming, to encourage the widest possible engagement and impact from investment. I am passionate about the role that the arts and culture should play in the life of the child and I am determined to help the UK preserve its identity as one of the worlds creative powerhouses. Fostering links for young people with creative industries and ensuring that classroom based activity has a tangible and meaningful link with the world beyond the school gates is of paramount importance. My work across all sectors of education has been to try and bring together a framework of experiences and opportunities, designed to help children and young people translate early educational achievement into meaningful attainment and develop the critical and creative skills vital for their future. Sam Atkins Hi, I'm Sam and have been working within the media and education industry for twenty years. Following a successful career in TV production I was appointed the role of a broadcast journalist with the BBC. Whilst with the BBC (Nations and Regions) I was part of the development team that established the highly successful BBC News School Report and BBC Parachutes programmes working with young people to produce professional level news packages for BBC output. In 2008 I established C1 Media Ltd, a media in education business, and to date have engaged with over 6500 young people from primary, secondary special, college and higher education sectors. Within my first year of operation with the Arts Service at CfBT Education Trust, we also launched The Young Journalist Academy in 2008. This highly successful education programme provides professional level training for children and young people. Partnerships developed over the years for both the YJA programme and other projects include: The Royal Albert Hall, BBC, English National Ballet, RAF, The Guardian, Cirque du Soleil, National Theatre and Royal Opera House. Sara Bullimore I have been working in the arts and cultural sector for over 20 years and during this time I have developed not only my own professional skills but more importantly, created high quality opportunities for commuities to participate, learn and enjoy the role arts and culture play in our lives. Initiating, delivering and managing a vast range of artistic projects both as an independent freelance arts consultant and in previous roles as the Arts Development Officer at City of Lincoln Council and at National Dance Agencies in Nottingham and London, have helped me to understand the value and critical importance of collaboration and partnership working. In particular my personal passions are literature and dance - I fully believe in the transformative power meaningful participation in quality arts and culture can have on a person's life - regardless of age or ability! I have extensive experience working with mupltiple partners and funders on projects. Working for the City of Lincoln Council I created and managed the Cultural Sector Partnership - working with partners in the private and public sector, heritage, arts and sports to develop strategies, conferences and cross cutting artistic programmes and festivals. I have undertaken and continue to work independently with Lincolnshire County Council, Writing East Midlands, Lincolnshire Aviation Heritage, Shakespeare Schools Festival, Kazzum Theatre Arts, University of Lincoln, Lincoln Business Improvement Group and Arts Council of England to name a few. Living in Linclonshire I am passionate about helping to esnure that connectivity exists between national and regional activities - helping to promote the best connectivity between opportunities and links between organisations.

Tutor Stream

tutor stream

London

Introduction The TutorStream Website helps Students to find Tutors, Tutors to market their services, and for Students to book and pay for Lessons. All of these terms and conditions apply to Students and Tutors, unless they specifically state otherwise, or are marked with a "T", when they only apply to Tutors. Clause 5 only applies to Tutors. These terms and conditions replace any previous versions of them. The TutorStream Website is owned and operated by Tutor Stream Ltd, trading as TutorStream. TutorStream is a limited liability company registered in England and Wales under company number 12338203. TutorStream's registered office is at Kemp House, 152-160 City Road, London, EC1V 2NX United Kingdom. TutorStream's other contact details are set out on the Website, which is at https://TutorStream.net. A User may register on the Website as a Student or as a Tutor. A User may use the Website without registering, but if a User does register, certain information will be stored, making future visits to the Website easier. By registering on or using our Website, the User agrees to be bound by these terms and conditions. These terms and conditions are legally binding – every User should read them fully before agreeing to them. (Please print or save these terms for future use as TutorStream will not keep a file copy specifically for the User and TutorStream cannot guarantee that they will remain accessible on the Website in future.) If a User does not wish to be bound by these terms, they should not use the Website. ("T") Where the person who agrees these terms and conditions contracts on behalf of a company/organisation, they hereby confirm that they have authority to act on behalf of that entity. Certain words are defined in clause 16 (Definitions) of these terms and conditions and are capitalised throughout. TutorStream Rights & Responsibilities This clause sets out what TutorStream promises to do: To help Tutors and Students to meet by allowing Tutors to advertise their professional tuition services on the Website, and Students to book and pay for Lessons To maintain a functioning Website, including communication systems, a booking platform and Online Classroom, wherever possible. TutorStream cannot guarantee that the Website will always be available, or that it will always work, but it will try to have it up and running properly at all times. Every now and again, the Website might need to be taken offline for maintenance purposes. To communicate any planned maintenance of the Website or Platform downtime. To use reasonable endeavours (which means to try hard!) to keep the Website free from viruses and worms. To use reasonable endeavours to check the identity of all Tutors and the background checks of Tutors who have Background Checked Status. (But if a Student is concerned about any Tutor, do not meet a Tutor alone.) To decide when a Tutor’s profile is sufficiently complete to be set live on the Website and be accessible by other Users. To communicate new Bookings, confirmation of Bookings and cancellations, to both Students and Tutors via the Website and by email (except where a Student or Tutor has chosen to alter their notification settings to exclude email communication). To endeavour to ensure that each Student’s payment of Lesson Fees and the payment of each Tutor’s Tutor Fees are processed promptly and usually within 9 days of a Lesson, when there is no Complaint or Failed Payment. To endeavour to ensure Complaints are considered promptly and in accordance with these terms and conditions. To endeavour to ensure that refunds to Students are made promptly in accordance with these terms and conditions. To endeavour to ensure that Failed Payments are processed promptly and in accordance with these terms and conditions. To take precautions TutorStream considers appropriate to protect Students' and Tutors' information. To monitor postings made on the Website and messages sent between Students and Tutors. TutorStream does so in the hope of helping Students and Tutors meet, but also to stop misuse of the Website, as set out in these terms and conditions.

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.

Skillstec

skillstec

Norwich

SkillsTEC is a specialist and dedicated training company for all disciplines of working at height. Although SkillsTEC is a newly formed company that started in March 2012, I have 30 years experience working in all areas of the access industry, including hire & sales and operation of all types of access equipment. Having been employed as work at height safety trainer within a multi-disciplined access company for the last 8 years, I have been instructor for IPAF [http://skillstec.com/forms/frmAbout.aspx#], PASMA [http://skillstec.com/forms/frmAbout.aspx#] and LADDER ASSOCIATION [http://skillstec.com/forms/frmAbout.aspx#]. I have written specific courses such as 'Roof Access - Utilising Ladders' for solar installers and maintenance workers. I enjoy passing on my gained knowledge to delegates that have attended my courses and I feel that it is now the right time to have a dedicated work at height centre here in Norwich, Norfolk to cover:- IPAF [http://skillstec.com/forms/frmAbout.aspx#] training courses are the industry accreditation for MEWP operators (cherry pickers, scissor-lifts, lorry-mounts, spiders and tow behind machines). PASMA [http://skillstec.com/forms/frmAbout.aspx#] training courses industry accredited mobile tower, low level access equipment (podiums etc.) and the only accredited general work at height course that offers a certificate and photo identity card. LADDER ASSOCIATION [http://skillstec.com/forms/frmAbout.aspx#] training courses for both users and inspectors. Yes there is an industry accredited body that has been around since 1947 which is dedicated to promoting the correct use of steps and ladders. HARNESS [http://skillstec.com/forms/frmAbout.aspx#] training courses, either IPAF [http://skillstec.com/forms/frmAbout.aspx#] specific for machine operatives, or a general 'all areas' course for people who need to use a harness in more than one area.

Wrexham Foyer

wrexham foyer

Denbighshire,

In this document the expression ‘we’ refers to, ClwydAlyn Housing Limited, Tir Tai Limited, PenArian Limited and Tai Elwy Limited, that provides housing and related services across North Wales. Each entity is the controller of its own personal data although data may be processed by other Group members on its behalf This privacy notice sets out how ClwydAlyn collects and uses information about you. Please read this privacy notice carefully to understand how we will use your personal information. If you have any questions or queries in relation to this privacy notice, you can contact our Data Protection Officer at: datacontroller@clwydalyn.co.uk 72 Ffordd William Morgan, St Asaph Business Park, St Asaph, Denbighshire, LL17 0JD 0800 1835757 (freephone from a landline) or 01745 536800 This privacy notice explains: What information we may collect about you How we use your information Contacting you Sharing your information Our legal basis for collecting, holding and using your information Security and storage of your information Your rights 1.What information we may collect about you The information we collect about you depends on why we are dealing with you. For example, if you make a housing application or become one of our tenants, we will need more information from you than if you are merely making an enquiry. We may collect the information about you in the following circumstances: If you call our Contact Centre When you call our contact centre we collect Calling Line Identification (CLI) information. We use this information to help improve its efficiency and effectiveness. We record calls for training and monitoring purposes. Additionally, our call handlers will make a record of your call in order to manage your query. We may need to share information with other organisations within or outside ClwydAlyn in order to respond to your call, for example so that we can organise maintenance or repairs or other support. We will usually tell you if it is necessary for us to pass information on to other organisations. If you email us Any email sent to us, including any attachments, may be monitored and used by us for reasons of security and for monitoring compliance with office policy. Email monitoring or blocking software may also be used. Please be aware that you have a responsibility to ensure that any email you send to us is within the bounds of the law. If you make a complaint to us When we receive a complaint from a person we make up a file containing the details of the complaint. This normally contains the identity of the complainant and any other individuals involved in the complaint. We will only use the personal information we collect to process the complaint and to check on the level of service we provide. If a complainant doesn’t want information identifying him or her to be disclosed to any person that the complaint is about, we will try to respect that. However, it may not be possible to handle a complaint on an anonymous basis. Similarly, where enquiries are submitted to us we will only use the information supplied to us to deal with the enquiry and any subsequent issues and to check on the level of service we provide. If you use our services We hold the details of the people who request and use our services so that we can provide these services and for other closely related purposes. For example, we use information about our service users to develop and improve our services and to make sure we are delivering services to different groups fairly. If you apply for housing or become a tenant, there is certain information that we require in order to process your application and manage your tenancy. If you do not provide us with this information, we will not be able to progress your application. When you visit our websites We automatically collect certain information when you visit one of our websites. Please see Use of Cookies below for more information about this. When you use our customer portal, you are able to view information held in our housing management system, including personal details, account statements, tenancy information, repair history and pay your rent / service charges. Please note that we use a third party provider, Verseone to support our customer portal. Information we receive from others We work closely with other organisations, such as local councils, police forces, voluntary sector organisations, other housing providers and our contractors, and we may receive information about you from them. If you visit our premises We may ask you to sign in and out if you visit staff or residents at our premises. Access is controlled for the purposes of building and occupant security. Access is recorded to assist with fire and other evacuation procedures. Furthermore, your image may be captured on CCTV to monitor and collect visual images for the purpose of security and the prevention and detection of crime. If you use our Wi-Fi or computer to access our IT systems, access and activity may be monitored to prevent misuse of Group property, according to our IS Corporate policies. Job applicants When individuals apply to work for us, we will only use the information they supply to us to process their application and to monitor recruitment statistics. Where we want to disclose information to a third party, for example where we want to take up a reference or obtain a ‘disclosure’ from the Criminal Records Bureau we will not do so without informing them beforehand unless the disclosure is required by law. Personal information about unsuccessful candidates will be held for 12 months after the recruitment exercise has been completed; it will then be destroyed or deleted. We retain de-personalised statistical information about applicants to help inform our recruitment activities, but no individuals are identifiable from that data. Once a person has taken up employment with us, we will compile a file relating to their employment. The information contained in this will be kept secure and will only be used for purposes directly relevant to that person’s employment. Once their employment with us has ended, we will retain the file in accordance with the requirements of our retention schedule and then delete it. If you are a member of one of our Boards, Committees or Panels We may ask for personal details for managing and statistical purposes. 2.How we use your information We process your personal information primarily in connection with managing our housing services. If you are a tenant, this includes managing your tenancy and dealing with any applications, queries or complaints that you make. Examples of how we use your information include: to confirm your identity to assess your suitability to access any of our services to manage your tenancy, care or support to ensure our properties are appropriately maintained and in accordance with legal obligations, such as periodic gas safety checks to notify you about important changes to our services to let you know about other relevant services, both ours and those of other parties whose products and services we have agreed should be made available to you (see the section below on 'Contacting you' for more information about this) to update and correct our records to carry out statistical and market analyses, including benchmarking exercises, to enable us to understand you better and improve our services, and in accordance with our operating Regulations to develop, test and improve our systems to ensure that content of our website is presented in the most effective manner for you and for your computer to administer our website and for internal operations, including troubleshooting, data analysis, testing, research, statistical and survey purposes to comply with other legal obligations, such as Health and Safety laws or safeguarding vulnerable people We may combine information we receive from other sources with information you give to us for the purposes set out above (depending on the types of information we receive). 3.Contacting you We will use your contact information to send you important information via letters, emails, text messages, or otherwise to telephone you. We may record telephone calls for security and training purposes. We may use the information we hold about you in order to provide you with information about our services which we feel may interest you. You can opt out of receiving marketing communications at any time, although please note that we will continue to send you important messages about your tenancy. If you have changed your mind about being contacted for marketing purposes, please contact our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800 to update your preferences. 4.Sharing your information We do not sell your information to any third party, but in certain limited circumstances we may disclose your personal information to: any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 736 of the UK Companies Act 1985; and/or other third parties in the following circumstances: if we are under a duty to disclose or share your personal data in order to comply with any legal obligation; in order to enforce or apply our terms and conditions and other agreements; to protect the rights, property, or safety of ClwydAlyn, our customers, or others; to investigate or prevent a crime. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction; to obtain any professional advice; and/or with your consent. 5.Our legal basis for collecting, holding and using your information Data protection law sets out various lawful legal bases (or ‘conditions’) which allow us to collect, hold and use your personal information: Where you have entered into a contract or contracts with us, we may need to use your information to provide you with our services. An example of this is where you have a tenancy with us. Where we are under a legal obligation which requires us to process your personal information. For example, notifications of Health and Safety incidents. We will sometimes use your personal information based upon your consent. We will always tell you where this is the case and ask you to agree before we process your information. An example of using your personal information with your consent is publishing your image as part of a photograph on our website. Finally, sometimes it is necessary to process your personal information for the purposes of our own legitimate interests. We will only do so where these interests are not overridden by the interests and fundamental rights or the freedoms of the individuals concerned. An example of this is when we may contact you about your experience of contacting our Customer Services Team or a recent repair to your property. Data protection law recognises certain "special categories" of personal information, which is information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information for uniquely identifying a person, information concerning health, and information concerning a person's sex life or sexual orientation. Information about criminal offences and records is placed in a similar category. These special categories of personal information are considered particularly sensitive and so we will only collect and use this information where you have given us your explicit consent or where we consider it necessary to do so. 6.Security and storage of your personal information The information about you that we collect may be transferred to, and stored at, a destination outside the European Economic Area (EEA). It may also be processed by staff operating outside the EEA who work for one of our suppliers. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. We will generally keep personal information about you no longer than is needed for as per our Retention Policy. 7.Your rights You have the right to request from us access to your own personal information. This is sometimes known as a 'subject access request'. You also have the right to ask us not to process your personal data for direct marketing purposes. We will tell you if we intend to use your data for this purpose or if we intend to disclose your information to any third party for this purpose. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data or by contacting our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800. From 25 May 2018, you will have additional rights to request from us: That any inaccurate information we hold about you is corrected That your information is deleted That we stop using your personal information for certain purposes That your information is provided to you in a portable format That decisions about you are not made by wholly automated means Many of the rights listed above are limited to certain defined circumstances and we may not be able to comply with your request. We will tell you if this is the case. If you choose to make a request to us, we will aim to respond to you within one month. We will not charge a fee for dealing with your request.

AS Mentoring

as mentoring

Ealing Green,

Aeryn Priyanu , Employment Consultant Aeryn has always had an interest in language and communication. Starting her early career in teaching English as a foreign language, she went on to shadow a Speech and Language Therapist and this started her interest in working with people on the autism spectrum. She worked in primary schools as a Learning Support Assistant then moved on to work for the National Autistic Society in a day centre. Aeryn started off as a Support Worker, moving up to become Deputy Manager of the day service. She supported individuals in their daily life and helped them gain work experience and vocational skills. As well as working as a consultant with AS Mentoring, Aeryn works in a college for young people with autism, facilitating individuals with functional and social aspects of life, supporting students to meet their targets and maintain long life independent living skills. Photo of Alan Alan Castellaro, Employment Consultant Alan's interest in Autism began when he attended St Andrew's primary school in Chinnor, Oxfordshire, one of the first schools in the country to teach Autistic children one to one. In 2009 he volunteered on a project for Kith and Kids supporting a young man with Autism and they have remained in regular contact ever since. He then worked for 4 years with Dimensions as an Assistant Service Manager of a residential home for adults with severe physical disabilities and Autism. For the last 4 years he has worked for Ambitious About Autism starting off as a Learning Behaviour Specialist and moving up to become a Learning Support Co-ordinator, and was instrumental in helping set up Ambitious College, London's first College for young adults with Autism. He has a BA Hons in Writing and Publishing and has a rich and varied employment history to draw upon. Photo of Alice Alice Mitra-Hall, Employment Consultant Alice previously worked for The National Autistic Society where she ran a Day Centre and facilitated a weekly social group. During this time Alice supported adults on the spectrum to develop their independent living and social skills, as well as supporting service users to apply for and attend college and work schemes, CV writing and interview practice. Alice has a BA Hons degree in Psychology and has also worked in a number of schools supporting teenagers with autism and has provided specialist individualised support for a family for over 10 years. Photo of Amira Amira Hassan, Employment Consultant Amira has been a mentor at AS Mentoring for 4 years. Amira has a variety of clients for both workplace and job-seeking support. After completing her PhD in Neuroscience from Imperial College London, Amira decided to be involved with AS Mentoring full time and is currently managing the Workshops Programme, overseeing the development and online delivery of workshops and group events throughout the year. Amira is warm and friendly, providing individual, autism-specific support and advice. Photo of Anna Anna Roads, Employment Consultant Anna spent 24 years in the investment management sector, working in sales, marketing, product development and client relationships for a number of blue chip firms including Lazards, Fidelity and Goldman Sachs. She developed successful business relationships with large corporates, consultancies and public sector organisations. In her leadership roles, she also enjoyed coaching and developing careers for younger team members. These are skills and contacts she brings to ASM clients. Over the past 6 years she has developed a number of voluntary roles; relaunched the local NAS branch as Chair (2011-2015), served on a local parents special needs forum (2012-2014), been elected a parent governor at a special needs school and worked as a volunteer mentor on a Research Autism Project. Her focus has been on education and now employment, both as a parent of a young person with ASC and through the influence of autistic colleagues she has served with before. Before joining the City, she gained a law degree from Cambridge University, an MBA from Cranfield Business School and qualified as a solicitor. Photo of Charlotte Charlotte Leighton, Employment Consultant Charlotte specialises in providing workplace support for individuals as well as working with organisations to provide autism specific support and advice. This experience has been honed through her work at ASM and her previous role as an Employment Support worker and trainer at The National Autistic Society. Charlotte has subsequently worked for HAIL in Haringey for two years managing social enterprises staffed entirely of employees with autism and learning disabilities. She has also worked as an Appropriate Adult supporting vulnerable individuals whilst in police custody. For the past ten years Charlotte has confidently designed and delivered social skills groups and workshops for adults with autism. As well as working for ASM she is also employed part-time for Resources for Autism in Barnet managing their adult services. Charlotte is able to support individuals emotionally as well practically as she holds certificates in Person Centered counselling and a diploma in Cognitive Behavioural Therapy. David Perkins, Director David was Head of Services at Prospects, the National Autistic Society's specialist employment service, from 2007 – 2013; he left in June 2013 to set up AS Mentoring. He has extensive experience of supporting people with an ASC into employment across the UK and abroad, and of providing a wide range of training, assessment and consultancy services to employers and other organisations in the UK, Europe and the US. He has worked continuously with people with autism since the early 1980s. David has spent the bulk of his working life in the voluntary sector and prior to the NAS spent many years running a group of specialist adventure playgrounds in London for over 1200 disabled children, (some 30% of whom were autistic). He has a BSc (Hons) in Operational Research from Lancaster University. Photo of Emma Emma Hills, Employment Consultant Emma has been teaching psychology and health related subjects to adults since 2009 with the majority of her work focusing on providing social purpose education in the community to hard-to-reach groups, including those with disabilities. Much of her work focuses on supporting learners through transition and has led her to develop herself as a coach as well as an educator. More recently she has found herself key-working with learners with disabilities in a transition college as well as training and supervising the staff who support them. Emma mentors and tutors a diverse range of learners including learners on the autism spectrum in her continuing work in the community. Emma works part-time as an Employment Consultant with ASM and finds her knowledge and experience gained from facilitating community courses such as 'confidence building', 'communication skills' or 'interviewing skills' compliments the role well. She has a BSc Hons Psychology, PG-dip Social research, PGCE in post-compulsory education and is a registered health and social care trainer as well as a full member of the Association for Coaching. Emma is also currently studying for an MA in Education: Culture and Identity, at Goldsmith university. Photo of Eve Eve Riches, Employment Consultant Eve Riches is an employment consultant for AS Mentoring, where she provides one to one support and workshop creation and delivery. Eve has a background in teaching Psychology and has been involved in mentoring for her whole career. She has a lifetime of lived experience of neurodiversity. Outside of ASM, Eve works as a life coach and mentor. Photo of Gurleen Gené Wyrley-Birch, Employment Consultant Gené is committed to raising awareness and understanding of ASC to improve social inclusion, acceptance and understanding; to making a real difference to the lives of people on the autism spectrum and in broader society. Over the past 12 years, while caring for and advocating for her son, Gené has developed an in-depth knowledge and understanding of autism as well as related challenges including ADHD, PDA, Social Communication Disorder and Sensory Processing Disorder. She has a creative, positive and flexible approach and is determined to combined her personal and professional experiences to help clients into work and successfully retain their jobs. Throughout her previous roles in both Investment Banking at JP Morgan and UBS Warburg and Commercial Conferencing, Gené had an active role in recruiting, training and mentoring new team members. Gené has worked across many sectors, including Finance, Pharmaceuticals, Defence, Utilities, Aviation and Telecommunication. Gené Holds a BA degree in Industrial & Organisational Sociology and Industrial & Organisational Psychology from the University of Cape Town. Photo of Gurleen Georgia Thursting, Employment Consultant Georgia has worked with autistic adults and children in a variety of settings including education, play and social settings for the past year. As a support worker with Resources for Autism, she continues to support her clients in achieving their personal and work goals and loves to get creative with her approach. Georgia also works for Share Community in Battersea as a music tutor/ therapist, building the confidence of adults through music and artistic expression. She also enjoys planning and delivering online workshops for adults with Autism, focusing on well-being, physical health and emotional expression through music making. Outside of her work in Autism, is a trained musician, singer/ guitarist and enjoys performing at events across the UK. Photo of Gurleen Gurleen Manku, Regional Employment Consultant Gurleen has 18 years' experience of autism. She has a sibling on the spectrum, and has previously worked in primary education for children with Special Educational Needs (SEN), and has been a SEN Secondary School Govenor. In 2015 Gurleen volunteered at Autism West Midlands to support adults with autism to find employment. She then worked for Enable, Shropshire Council as a Job Coach in various workplaces supporting adults with autism and learning disabilities. Gurleen is highly experienced in delivering Pre-employment support, mentoring and Workplace support at AS Mentoring across the West Midlands since 2015. Gurleen holds a BSc in Business Psychology and is a member of the British Psychological Society, within the Division of Occupational Psychology. She has also completed her Masters in Occupational Psychology. Photo of Gurleen Mahlia Amatina, Employment Consultant Diagnosed with autism as an adult, Mahlia has first-hand experience of the challenges that can arise from a range of workplace settings, but more importantly; how to overcome these. Outside of AS Mentoring, Mahlia works as a visual artist, where she raises awareness and understanding of neurodiversity through different art forms. With a special interest in autism and work, Mahlia is keen to combine lived workplace experience with her mentoring skills as an employment consultant to support clients. Photo of Helen Mark Blake, Employment Consultant Mark has a broad range of experience across social care with several client groups and in varied settings. Following an arts degree he spent a couple of years on voluntary projects with disabled adults living independently, and with homeless men in an emergency night shelter in central London with subsequent paid roles including community support work with disabled adults moving back into the community following long periods in residential hospitals. Mark has also spent time as a residential care worker in adolescent residential units. The last 30 years has seen a focus on Adults and Children with Disabilities in a both a Day Service and Residential Home setting. As a Manager of services in these fields Mark has increasingly focused his support to children and adults on the autistic spectrum and has become keenly aware of the challenges faced by them and their families in achieving independence and realizing their potential. It is this interest that has led to an involvement in a mentoring role with AS mentoring and employment. Photo of Helen Mike Leat, Employment Consultant Mike comes from a background in advocacy, design and communication. Through his own business he previously ran an Easy Read design service which employed people with a learning disability and autism. In 2015 he co-produced a DVD on Autism and Mental Health for the Autism Partnership Board in Surrey. Mike previously worked for The National Autistic Society Assist service providing one to one support/mentoring sessions, and facilitating social and support groups for autistic adults. After completing an undergraduate module in autism with The Open University, Mike went on to complete a Postgraduate Certificate in Autism and Asperger syndrome. Mike also works with a project called ‘Autism by Experience’ which is a team of mostly autistic adults providing Understanding Autism training to staff in a variety of roles including health and social care. Photo of Laura Lauren Moore, Employment Consultant Lauren has a number of years experience of supporting people with autism as well as additional needs. Her main influence for working with people on the spectrum is her younger sibling who was diagnosed with autism at a young age. Over the past decade she has worked in a school specifically of young people with social, emotional and mental health difficulties, starting as a Teaching Assistant and then working as the Intervention Co-ordinator for the secondary department. Lauren also worked in a specialist autism college as a Learning and Behaviour Specialist, moving up to become a Learning Support Co-ordinator. She studied History at undergraduate level and has more recently graduated with a Masters in Intellectual and Developmental Disabilities in July 2018. Photo of Rachel Rachel Pearson, Senior Regional Employment Consultant Following a successful 13-year career in the City Rachel moved into HR and Business Consultancy specialising in organisation restructuring projects involving (often large scale) job review, recruitment and redundancy programmes. She has extensive experience of working with SME employers and large organisations in the public and private sectors around all aspects of the employment relationship. Rachel previously volunteered with the National Autistic Society's Prospects Team and she now works as an employment consultant specialising in supporting people with an ASC to find and retain work. She also works with the NAS's Employment Training and Adult Services Teams supporting students and employees, and providing advice and guidance to employers. With a close family member on the autistic spectrum, Rachel also volunteers with her local NAS branch in Surrey. She holds an MSc in Human Resource Management and is a Member of the Chartered Institute of Personnel & Development. Photo of Siobhan Siobhan Pauley, Employment Consultant Siobhan has first-hand experience of supporting someone with Asperger’s Syndrome and ADHD as her son has moved through various life transitions, experiencing the hurdles faced by people on the autistic spectrum. She spent 30 years working within Human Resources of a large financial institution attaining her MCIPD status, where she became the company’s Reasonable Adjustment Officer. It was her responsibility to ensure that employees with disabilities were able to receive the right workplace accommodations to enable them to access various roles in the company. This has given her considerable insight to enable her to support our clients. Following a career move, Siobhan is setting up AS Mentoring services in and around Poole, Dorset- as well as working part time to support an individual with profound learning difficulties within an independent living service.

Black's Academy

black's academy

London

AQA A level Mathematics 7357 AS level Mathematics 7356 GCSE higher level Mathematics 8300H GCSE foundation level Mathematics 8300F Edexcel A level Mathematics 9MA0 AS level Mathematics 8MA0 GCSE higher level Mathematics 1MA1H GCSE foundation level Mathematics 1MA1F OCR A level Mathematics H240 AS level Mathematics H230 GCSE higher level Mathematics J560 GCSE foundation level Mathematics Other courses IGCSE extended level Mathematics 0580 Scholastic Apititude Test (USA Exam) GED (USA Exam) All other exams Click on any of the above links to obtain free resources Book free diagnostic now blacksacademy symbol Director Peter Fekete Educational consultancy | Curriculum design | Courses for adults | Public speaking | Publications CONTACT a CONTENT OF THE REMOTE LEARNING SYSTEM * US GRADE 6 / UK GCSE GRADE 2–3 1. Addition and subtraction 2. Starting number sequences 3. Further number sequences part I 4. Multiplication to 8 x 8 5. Further number sequences part II 6. Multiplication to 12 x 12 7. Square numbers 8. Positive and negative numbers 9. Sums 10. Shapes and perimiters 11. Measurement and areas 12. Reading information 14. Understanding fractions 15. Decimals 16. Percentages 17. Long multiplication 18. Beginning algebra 19. Beginning probability 20. Beginning geometry 21. Properties of numbers 22. Telling the time 23. Geometry in three dimensions US GRADE 7 / UK GCSE GRADE 4 1. Deeper understanding of number 2. Combinations 3. Long division 4. Operations 5. Practical problems 6. Order and type of numbers 7. Measurement 8. Time and time management 9. Fractions 10. Organising information 11. Ratio and proportion 12. Probability 13. Angles 14. Visual reasoning 15. Bearings 16. Working in two dimensions 17. Working in three dimensions 18. Transformation geometry 19. Continuing algebra US GRADE 8 / UK GCSE GRADE 5–6 1. Patterns and pattern recognition 2. Lines, regions and inequalities 3. Mastering fractions 4. Types of number 5. More about triangles 6. Measurement and computation 7. Proportionality 8. Working with space 9. Indices 10. Further work with ratio 11. Investments 12. Further algebra 13. Quadrilaterals and polygons 14. Speed and displacement 15. Continuing with probability 16. Describing data US GRADE 9 / UK GCSE GRADE 6–7 1. Further proportionality 2. Congruency 3. The tricky aspects of algebra 4. Lines and equations 5. Basic formal algebra 6. Analysis and display of data 7. Graphing functions 8. Dimension and algebra 9. Algebraic fractions 10. Circle theorems 11. Algebraic factors 12. Simultaneous equations 13. Velocity and acceleration 14. Proportionality and scatter 15. Number puzzles US GRADE 10/ UK GCSE GRADE 7–8 1. Transpositions 2. Patterns and pattern recognition 3. Algebraic manipulations 4. Quadratics 5. Surds 6. Linear inequalities 7. Functions 8. Trigonometry 9. Systems of linear equations 10. Further presentation and analysis of data 11. Polynomial functions 12. Algebraic products 13. Finding roots 14. Intersection of lines and curves 15. Indices and index equations US GRADE 11/ UK GCSE GRADE 8–9 1. Completing the square 2. Venn diagrams 3. Coordinate geometry with straight lines 4. Further trigonometry 5. Transformations of curves 6. Modulus 7. Basic vectors 8. Quadratic inequalities 9. The quadratic discriminant 10. Arcs, sectors and segments 11. Circles, curves and lines 12. Probability and Venn diagrams 13. Functions, domains and inverses 14. Trigonometric functions 15. Recurrence relations 16. Further elementary vectors FREE LEGACY RESOURCES Business Studies, Economics, History, Mathematics, Philosophy, Sociology Business Studies PEOPLE AND ORGANISATIONS 1. Management structures and organisations 2. Leadership and management styles 3. Classical theory of motivation 4. Human relations school 5. Management by objectives 6. Workforce planning 7. Recruitment 8. Payment systems MARKETING 1. The economic problem 2. Money and exchange 3. Price determination 4. Determinants of demand 5. Market analysis 6. Marketing and the product life cycle 7. Objectives and marketing EXTERNAL INFLUENCES 1. Stakeholders 2. Business ethics 3. Market conditions 4. Business and the trade cycle 5. Business and technological change 6. Business and inflation 7. Business and exchange rates 8. Business and unemployment ACCOUNTING & FINANCE 1. Cash Flow Management 2. Costs, Profits & Breakeven Analysis 3. Budgeting & Variance Analysis 4. Sources of Finance 5. Profit & Loss Account 6. The Balance Sheet 7. Depreciation by the fixed-rate method 8. Reducing Balance Method 9. Stock Evaluation 10. Working Capital and Liquidity 11. Accounting Principles and Window Dressing 12. Costing and Management Accounting 13. Investors and the Corporate Life Cycle 14. Investment Appraisal: Average Rate of Return 15. Investment Appraisal: Payback Method 16. Investment Appraisal: Net Present Value 17. Investment Appraisal: Internal Rate of Return 18. Profitability Ratios 19. Liquidity Ratios 20. Efficiency and shareholder ratios 22. Gearing and Risk 23. Net Asset Value Economics MARKETS & MARKET FAILURE 1. The economic problem 2. Productive and allocative efficiency 3. Money and exchange 4. Price determination 5. The money market 6. Introduction to the labour market 7. The determinants of demand 8. Supply and elasticity of supply 9. Excess supply and excess capacity 10. Elasticity of demand 11. Market structures 12. Income and cross elasticity 13. Market failure 14. Factor immobility 15. Public and private goods 16. Merit and non-merit goods 17. Cost-benefit analysis 18. Competition policy 19. Market failure and government intervention History ANCIENT HISTORY 1. Prehistory of Greece 2. Mycenae, the Heroic Age c.1550—1125 BC 3. The Greek Middle Ages c.1125—c.700 BC 4. The Greek Tyrannies c. 650—510 BC 5. Sparta 6th and 7th centuries BC 6. Athens and Solon 7. The early inhabitants of Italy 8. The Etruscans 9. Early Roman History up to Tarquin GERMANY & EUROPE 1870—1939 1. Social Change from 1870 to 1914 2. Socialism in Europe 1870 to 1914 3. The Balance of Power in Europe 1870 4. Anti Semitism in Europe 1870 to 1914 5. The Structure of Wilhelmine Germany 6. Bismarck and the Alliance System 7. Weltpolitik 8. Colonial Rivalries 9. First and Second Moroccan Crises 10. The First World War triggers 11. The Causes of the First World War 12. Germany and the First World War 13. Military history of the First World War 14. The Treaty of Versailles 15. The Domestic Impact of the First World War 16. The German Revolution 17. The Weimar Republic 18. The Early Years of the Nazi Party 19. The Rise of the Nazi Party 20. The Establishment of the Nazi Dictatorship 21. Nazi Rule in Germany 1934 to 1939 22. The Economics of the Third Reich 23. Appeasement RUSSIA & EUROPE 1855—1953 1. Alexander II and the Great Reforms 2. Imperial Russia under Alexander III 3. Nicholas II and the 1905 revolution 4. Social and economic developments in Russia 5. Russia: the Great war and collapse of Tsarism 6. Provisonal Government & October Revolution 7. The Era of Lenin 8. The Development of Lenin's Thought 9. New Economic Policy and the Rise of Stalin 10. Stalin and the Soviet Union 1924 to 1953 11. Stalin and the Soviet Economy 12. Stalin and International Relations BRITAIN 1914—1936 1. The Great War and Britain 1914—15 2. Britain during the Great War, 1915—16 3. Lloyd George & the Great War, 1916—1918 4. Great Britain after the War, 1918—22 5. British Politics, 1922—25 6. Class Conflict & the National Strike, 1926 7. Britain & International Relations, 1925—29 8. Social Trends in Britain during the 1920s 9. Social Issues during the late 1920s 10. British Politics 1926—29; Election of 1929 11. Britain — the crisis of 1929 12. The Labour Government of 1929—31 13. Britain and economic affairs, 1931—33 14. Britain and Foreign Affairs, 1931—36 15. Social Conditions in Britain during the 1930s Advanced level Mathematics ALGEBRA & GEOMETRY 1. Simultaneous Equations 2. Polynomial Algebra 3. Cartesian Coordinates 4. The equation of the straight line 5. Intersection of lines and curves 6. Remainder and Factor Theorems 7. Functions 8. Quadratic Inequalities 9. Graphs of Inequalities 10. Indices 11. Polynomial Division 12. Velocity-Time Graphs 13. Tally Charts 14. Absolute and relative errors 15. Sequences and Series 16. Arithmetic Progressions 17. Proof by Contradiction 18. Geometric Progressions 19. The Cartesian Equation of the Circle 20. Transformations of graphs 21. Plane Trigonometry 22. Modulus 23. Trigonometric Functions 24. Inverse Trigonometric Functions 25. Linear Inequalities 26. Proportionality 27. Probability 28. Surds 29. Special Triangles 30. Quadratic Polynomials 31. Roots & Coefficients of Quadratics 32. Radian measure 33. Permutations and Combinations 34. Set Theory and Venn Diagrams 35. Sine and cosine rules 36. Elementary Trigonometric Identities 37. Roots and curve sketching 38. Graphs and roots of equations 39. Picards Method 40. Small Angle Approximations 41. Simultaneous equations in three unknowns 42. Linear relations and experimental laws 43. Conditional Probability 44. Pascal's Triangle and the Binomial Theorem 45. Index Equations and Logarithms 46. The Binomial Theorem for Rational Indices 47. Exponential Growth and Decay 48. Exponential and Natural Logarithm 49. Compound Angle Formulas 50. Sinusoidal functions 51. Vector Algebra 52. The Vector Equation of the Straight Line 53. The Scalar Product of Vectors 54. Axiom Systems 55. Introduction to Complex Numbers 56. The algebra of complex numbers 57. Complex Numbers and the Argand plane 58. De Moivres Theorem 59. Eulers formula 60. Further loci of complex numbers 61. Further graph sketching 62. Mathematical Induction 63. Proof of the Binomial Theorem 64. Polar Coordinates 65. Conic sections 66. Partial Fractions 67. First-order linear recurrence relations 68. Summation finite series with standard results 69. Method of differences 70. Trigonometric Equations 72. Series Expansion 73. Lagrange Interpolating Polynomial 74. Error in an interpolating polynomial 75. Abelian groups 76. Geometrical uses of complex numbers 77. Cyclic Groups 78. The Cayley-Hamilton Theorem 2x2 Matrices 79. Cayley Theorem 80. Determinants 81. Isomorphisms 82. Lagrange theorem 83. Properties of groups 84. Group structure 85. Subgroups 86. Homomorphisms 87. Matrix Algebra 88. Determinant and Inverse of a 2x2 matrix 89. Gaussian elimination 90. Matrix representation of Fibonacci numbers 91. Matrix groups 92. Inverse of a 3 x 3 Matrix 93. Singular and non-singular matrices 94. Properties of Matrix Multiplication 95. Induction in Matrix Algebra 96. Properties of Determinants 97. Permutation groups 98. First Isomorphism Theorem for Groups 99. Roots of Polynomials of Degree 3 100. Scalar Triple Product 101. Systems of Linear Equations 102. Matrix Transformations 103. Mappings of complex numbers 104. Cross product of two vectors 105. Vector planes 106. Eigenvalues and Eigenvectors CALCULUS 1. Introduction to the Differential Calculus 2. Stationary points and curve sketching 3. Applications of Differentiation 4. Differentiation from First Principles 5. The Trapezium Method 6. Integration 7. Direct Integration 8. Applications of integration to find areas 9. Graphs of Rational Functions 10. Derivatives of sine and cosine 11. Products, Chains and Quotients 12. Volumes of Revolution 13. Exponential and Logarithmic Functions 14. Integration by Parts 15. Parametric Equations 16. The Integral of 1/x 17. Integration by Substitution 18. Implicit Differentiation 19. Formation of a differential equation 20. Separation of variables 21. Integrals of squares of trig functions 22. Maclaurin Series 23. Techniques of Integration 24. Integrating Factor 25. The Newton-Raphson formula 26. Errors in Numerical Processes 27. Roots and Recurrence Relations 28. Derivatives of Inverse Trig. Functions 29. Second order homogeneous equations 30. Second order inhomogeneous equations 31. Implicit differentiation — second derivative 32. Integrands to inverse trigonometric functions 33. Integrands to logarithmic function 34. Integration of Partial Fractions 35. Logarithms and Implicit Differentiation 36. Implicit differentiation and MaClaurin series 37. Separation of variables by substitution 38. Trigonometric Substitutions for Integrals 39. Truncation Errors 40. Euler and Trapezoidal Method 41. Numerical methods for differential equations 42. Simpson Method 43. Proof of Simpson Formula 44. Richardson Extrapolation 45. Arc length of a curve in Cartesian coordinates 46. Arc length of a curve in Polar coordinates 47. Arc length of a curve: Parametric form 48. Curves in Euclidean space 49. Functions and continuity 50. The gradient of a scalar field 51. The derivatives of the hyperbolic functions 52. Hyperbolic Functions 53. Inverse Hyperbolic Functions 54. Hyperbolic Identities 55. Integrals with inverse hyperbolic functions 56. Reduction formulae 57. Simultaneous differential equations 58. Surface of Revolution 59. Vector differential calculus 60. Scalar Fields and Vector Functions STATISTICS & PROBABILITY 1. Central Tendency: Mean, Median and Mode 2. Standard Deviation 3. Cumulative Frequency 4. Discrete Random Variables 5. Mutually exclusive and independent events 6. The Binomial Distribution 7. The Normal Distribution 8. Standardised Normal Distribution 9. Regression Lines 10. Correlation 11. The Geometric Distribution 12. Hypothesis Testing — Binomial Distribution 13. Index Numbers 14. Time Series Analysis 15. Bayes Theorem 16. Confidence interval mean — known variance 17. The Central Limit Theorem 18. Pearsons product moment correlation 19. Spearmans Rank Correlation Coefficient 20. Hypothesis Testing — Normal Distribution 21. The Poisson Distribution 22. The Normal Approximation to the Binomial 23. The Normal Approximation to the Poisson 24. The Poisson Approximation to the Binomial 25. Type I and type II errors 26. Scalar multiples of a Poisson variable 27. Test for the Mean of a Poisson distribution 28. Random Number Sampling 29. Estimating Population Parameters 30. Random Samples and Sampling Techniques 31. The Concept of a Statistic 32. Hypothesis test for the population variance 33. Central Concepts in Statistics 34. Continuous Probability Distributions 35. Modeling: Chi squared goodness of fit 36. Chi squared test for independence 37. Degrees of Freedom 38. Difference Sample Means Unknown Variance 39. Moment generating functions 40. Probability generating functions 41. Linear Combinations of Random Variables 42. Maximum Likelihood Estimators 43. Wilcoxon signed rank test on median 44. Non-parametric significance tests 45. Single-sample sign test of population median 46. Paired-sample sign test on medians 47. Paired sample t-test for related data 48. Paired sample Wilcoxon signed rank test 49. Difference of two sample means 50. Pooled sample estimate 51. Testing the Sample Mean 52. The Uniform Distribution MECHANICS 1. Velocity-Time and Displacement-Time Graphs 2. Force diagrams 3. Representation of Forces by Vectors 4. Static Equilibrium 5. Equilibrium of coplanar forces 6. Weight and Free Fall 7. Normal Reaction and Friction 8. Newtons First and Second Laws 9. Relative Motion 10. Projectiles 11. Calculus and Kinematics 12. Motion of a Particle: Vector calculus form 13. Work 14. Energy Conversions 15. Gravitational potential and kinetic energy 16. Connected Particles 17. Moments 18. Linear momentum 19. Power 20. Hookes Law 21. Simple Harmonic Motion 22. Simple Harmonic Motion and Springs 23. Calculus, Kinematics in Three Dimensions 24. Sliding, toppling and suspending 25. Impulsive Tensions in Strings 26. Angular Velocity 27. Motion in a Horizontal Circle 28. Centre of Mass of a Uniform Lamina 29. Motion in a Vertical Circle 30. Motion under a Variable Force 31. Conservation of Angular Momentum 32. Centre of Mass of a Composite Body 33. Motion under a central force 34. Centre of Mass of a Uniform Lamina 35. Centre of Mass Uniform Solid of Revolution 36. Equilibrium of Rigid Bodies in Contact 37. Damped Harmonic Motion 38. Moment of Inertia 39. Impulse, elastic collisions in one dimension 40. Parallel and Perpendicular Axis Theorems 41. Motion described in polar coordinates 42. Simple pendulum 43. Compound pendulum 44. Stability and Oscillations 45. Vector calculus 46. Linear Motion of a Body of Variable Mass DISCRETE & DECISION 1. Algorithms 2. Introduction to graph theory 3. Dijkstra algorithm 4. Sorting Algorithms 5. Critical Path Analysis 6. Dynamic Programming 7. Decision Trees 8. The Maximal Flow Problem 9. The Hungarian algorithm 10. Introduction to Linear Programming 11. Simplex Method 12. Matching Problems 13. Game Theory 14. Minimum connector problem 15. Recurrence relations 16. Proofs for linear recurrence relations 17. Simulation by Monte Carlo Methods 18. Travelling and Optimal Salesperson Problems 19. The Travelling Salesperson Problem Philosophy INTRODUCTION TO PHILOSOPHY 1. The problem of evil 2. Introduction to Plato 3. Knowledge, belief and justification 4. Descartes Meditation I 5. Introduction to the problem of universals 6. Introduction to metaethics 7. Subjectivism versus objectivism 8. Aristotle's function argument 9. Natural Law Theory 10. Utilitarianism 11. The Nicomachaen Ethics of Aristotle 12. Virtue Ethics 13. Descartes Meditation II 14. Hume and empiricism 15. The paradox of induction 16. Hume's attack on Descartes 17. The Cosmological Argument 18. The Ontological Argument 19. The Teleological Argument 20. The Argument from religious experience 21. The Moral Argument 22. The argument from illusion 23. Materialism 24. Human Identity Sociology PERSPECTIVES & METHODOLOGY 1. Introduction to Marxism 2. Introduction to Durkheim 3. Weber: classes, status groups and parties 4. Introduction to patriarchy and gender roles 5. Mass culture theory 6. The Frankfurt school STRATIFICATION & DIVERSITY 1. Ethnic groups and discrimination 2. Race, Ethnicity and Nationalism 3. Social Inequality 4. Theories of Racism 5. Class structure 6. Modern Functionalism and Stratification 7. Social Mobility 8. Bottomore: Classes in Modern Britain 9. American exceptionalism ASPECTS OF SOCIETY 1. Definitions of Poverty 2. Theories of Poverty 3. Solutions to Poverty 4. Alienation 5. Leisure 6. Work and Technological Change 7. Conflict and Cooperation at Work 8. Attitudes to Work 9. Unemployment 10. Perspectives on Education 11. Education and Ethnicity 12. Education and Gender 13. The Family and Social Structure 14. The Family and Household Structure 15. Conjugal Roles 16. Marital Breakdown 17. Post War Education in Britain 18. British Social Policy 1945—1990

A-list Film Production Pro

a-list film production pro

London

ably. Productions Inc.: a production company that deals in all aspects of creative projects from film and television production to CD manufacturing http://www.acepix.com Ace Pix International, Inc.: a full in-house motion picture / television production and distribution company http://www.ancientpictures.comAncient Pictures: a Seattle-based motion picture and commercial production Company, as well as a networking center for writers to meet, enhance their skills and network in the film industry http://www.apotheosispictures.comApotheosis Pictures Productions: an independent film production company and the developers of the ScreenForge screenwriting software for Microsoft Word. ScreenForge is the best and most affordable screenplay formatting software available for MS Word, and a viable alternative to the much more expensive stand-alone screenwriting programs Armageddon Productions: creators of the 1997 home video release "Bloodletting," they develop and produce feature films, digital visual effects and music and movie soundtracks. They have also developed screenplays for other companies, such as Full Moon Pictures' "Witchouse" and "Alien Arsenal," and Regent Entertainment's upcoming "The Brotherhood" Assembler Films: a company that has shot and released films in Italy, Japan, India, the U.S. and Canada, to name a few Belarus Productions: Minsk-based independent production company, providing assistance to film-makers and broadcast journalists. TV production, film production, crew hire, equipment rent and location scouting in Belarus Black Cab Productions: an independent film, music, and literary production company specializing in horror, bizarre, and dark works http://www.blackfishfilms.comBlackFish Films: quality international productions specializing in non-broadcast projects for educational, military and corporate projects. Shooting 16, 35 and 70mm. Free goodies for independent producers Blokland Pictures: specializing in the development, production, and distribution of feature film drama; serving the international specialty marketplace http://www.angelfire.com/tn/tcthepackrat/bloodyfun.htmlBloody Fun Pictures: no-budget video/filmmaking, since 1996 http://www.bwave.f9.co.ukBrainwave: in the business of producing their own peculiar brand of entertainment for over a decade: films, radio plays, songs, etc. on the smallest budgets imaginable http://www.brilligprods.comBrillig Productions: exploring creative areas of filmmaking; developing narratives that range from the fanciful to the bizarre, visual designs that push the limits of independent cinema, and story-telling techniques that are inspired and inspirings http://www.c21etv.comC21ETV: one-stop-shop providing multimedia design, implementation and programming, VCD business cards production, video/TV production, digital, broadcast, industrial, post production http://www.cabiriafilms.com Cabiria Films, Prague: Filming in East Europe – locations & production services Cambridge Films: an independent production company http://www.cinedictum.com Cinedictum: a production company which produces cinedicta. Described as a form of film-aphorism, cinedicta are very short films whose concise narrative holds both entertainment and moral value, while addressing universal themes http://www.commercialfactory.comThe Commercial Factory: specializing in the production of high-quality television commercials, from the original idea to broadcast ready http://www.cotenfilms.comCoten Films: an independent film production company specialising in corporate and private video work, Web design and new media. Responsible for the action comedy feature film "Cop on the Edge IX" and the forthcoming "Days' End" http://www.crystalpyramid.comCrystal Pyramid: broadcast video production company in San Diego, California http://www.homestead.com/degalazare/dlp.htmlDega Lazare Productions: movies and other multimedia productions being made in the small town of Kahnawake by teens. From action/adventure to horror and comedy, it's all there http://www.dereko.tvDereko Entertainment: a small, independent and privately held feature film production company based in Los Angeles, California. Whose goal is to produce and release one or more feature films per year, both domestic/international territories Documentary Educational Resources (DER): produce, distribute and promote anthropological and documentary films and videos http://www.doublegproductions.comDouble G Video Productions: a video productions company providing a wide range of service and talent bank for your productions needs. "From gold to gold let Double G video productions get your story told!" http://www.egygrip.comEgygrip: a skilled team of professionals based in Egypt, and capable of managing every step of the video or film production process from concept to compeletion Emerald Oceans Entertainment: a multi-media company with film and music divisions. Founded in 1995 as a film production company it has evolved into its current broader base, which is helping it establish its place in the industry Eye Light Media: creating films, videos, music and Web sites from a Christian world view The Farnham Film Company: a UK-based TV production company interested in co-production–particularly of children's programming http://www.angelfire.com/film/file5home/about.htmlFile5 Productions: producer of market-specific sports videos by writer-director-actor David Lima http://www.filmforum.comFilm Forum: New York's leading movie house for independent premieres and repertory programming http://www.fireflyonline.comFirefly Entertainment: established in 1994 to allow aspiring talents and interested persons to achieve their goals in film, television, and theatre. The group has won multiple awards, is comprised of members of all ages, and is based in west central Pennsylvania http://www.footlooseproductions.com/Footloose Productions: film and video production company specializing in documentaries, commercial films, photo shoots, movies, and music videos http://www.fourhorsemenfilm.com/Four Horsemen Films, LLC: an independent film production company in New Jersey http://www.angelfire.com/movies/gmcproductions/gmc.htmGMC Productions: teenage independent film makers on a low budget. See screening room with video clips, and check out past films Goldader Film Productions GmbH: creates and produces feature films, TV movies, commercials, music videos, 3-D animated shorts, interactive CDs and DVDs, educational and corporate films, CDs and DVDs Gulliver Media Australia: producing award-winning television documentaries and videos Harrington Productions: content creators for video, film and new media. Based in Maui, Hawaii, they supply field production packages, crew and post production. Client list includes ABC-Sports, ESPN, E! Entertainment, NBC, BBC and The Discovery Channel http://go.to/headscrewHeadscrew: working entirely in the film medium, they provide affordable commercial shoots for local Seattle businesses, create traditional clay, cel, line and computer animations and also stage location shoots for studios who are unable to re-locate a full crew for short periods of time http://www.focusfilms.comHocus Focus Films, Israel: Filming in a foreign country could sometime become a metaphysic experience. In Israel, life itself is. To cut Red Tape, achieve Green Lights, and avoid Blue Holes. Contact a production house that can accommodate all your needs http://www.hollywoodpa.comHollywood PA: the world's first Global Movie Set. This is an independent film, shot in Central Pennsylvania. You were able to watch it live from the set, interact with the cast and crew and discover the passion and pain in filmmaking http://www.iconent.comIconoclastic Entertainment: dedicated to finding and creating the finest screenplays on the planet http://www.imageproducers.comImage Producers: a full service video and multimedia production company working on a local, regional, national, and international basis. Their creative staff works together to develop the concept, write the script, shoot the footage, and take the project through post-production to deliver the finished product http://www.ipcfilms.comIPC Films: IPC is a production company looking for ideas, projects, scripts, talent, and investors http://www.jam-productions.comJam Productions a San Francisco Bay Area video/film company that does broadcast quality commercials, special event filming, indie film projects, multi-media and more http://www.jamsessionfilms.comJam Session Productions: a minority/woman-owned midwest-based film and multimedia company whose projects have included music videos, commercials and PSA's, training films, industrial films, TV program segments and more Janson Media: an international program sales and distribution company, a "content" company. We have licensed programming to over 180 countries around the world. Please see our Clients page, for a fairly complete list of the broadcasters and cable and satellite networks to whom we license programming http://www.jetifilms.comJeti Films: an independent film company based in Louisiana http://www.kaizenfilms.comKaizen Films: their mission is to develop new technologies and techniques to enhance the production of motion pictures, while maintaining cinema as an art form http://www.kineticimage.comKinetic Image Co., Ltd.: an Ohio-based motion picture production company that, for nearly twenty years, have specialized in creating exciting motion picture entertainment on budgets that would shame a cat. They created a number of well-received cult items which have graced the schedules of the USA Network and Cinemax http://www.kiwifilm.comKiwi Film & Video, Asia: a Hong Kong and Singapore based film and video production service company catering to a broad range of clients from around the world; fully-equipped camera crews is their specialty http://www.ltfilms.comLarry Taylor Productions: dedicated to providing creative projects for family entertainment, including movies and television programs, as well as the construction of a new and unique style of theme park. The vision: To put the heart into every picture. http://www.leafpile.tvLeaf Pile TV: Tune In: This TV variety program is filled with a swarm of segments composed of local events and artist interviews which provide musical entertainment and hilarious sketch comedy. Leaf Pile also has freelance videography for your major rock video or demo. Check out our exclusive camera packaging http://www.littlerickyproductions.comLittle Ricky Productions: feature films that reach the moral conscience of America http://www.mecfilms.comMatrixx Entertainment: The World's First Virtual Movie Studio(tm). Services include: producing, financing and distributing independent feature films; Web site, production and legal consulting for entertainment clients; books and manuals on filmmaking and more Media Movers,Inc.: full service localization company offering services in dubbing,subtitling,voiceovers & production in Asian, Indian & European http://members.aol.com/mptvMPTV: offering on-location video production, graphics and animation design, AVID video post production, Macromedia Director authoring, and many more services http://www.mptv.commptv.com: Film, video and audio production and distribution http://www.mundiali.comMundiali Entertainment: providing a venue for the production of lower cost motion pictures ($15 and $20 million each) and television programming (based on a cooperative agreement between Mundiali and either a television network or special project investors) http://members.tripod.com/%7EOverboardProductionsOverboard Productions: an independent film production copmpany headed up by Matt Fore http://www.angelfire.com/ga/PARALLELAFTERNOONParallel Afternoon Productions: independent thinkers with a vision that strives to be unequaled http://www.peacerecord.comPeace Record Company: a multi-faceted audio/video production company offering video editing, acting video demo production, video/audio tape duping, video projection and sound systems rentals, wedding videos, on location multi-camera video recordings of special events and more http://www.phproductions.comPH Productions: services include business and personal consulting and coaching, project development, script writing, video production, video biographies, television programs, infomercials, commercials, photography and 3-d animation http://www.psavideo.comProduction Services Arizona: since 1971, providing quality, production services in the areas of video, multimedia, and animation graphics. Serving clients worldwide from Korea to France, South America to Canada in medium to high budget corporate marketing and training venues. Full collateral support through PS/A's graphics dept. Rawbass: design and production of all types of artistic media http://www.rcwmediaworks.comRCW Media Works: an independent production company that realizes that it is not the size of your budget that determines quality, it is the dedication and heart that you put into your projects http://www.realitycrash.comReality Crash Productions: showcases original and creative projects from writers, artists, film makers and critics. They are looking for people to contribute to the site. You retain full rights for your work and a web page is provided for you http://www.revivalentertainment.com/Revival Entertainment: this team is producing films of the highest quality in Surrey England http://www.riggedproductions.comRigged Productions: film and video, cartoons and art, writing, music and audio, and other works http://www.riverproductions.comRiver Productions: an independent film company located in Los Angeles, CA, headed by Michael J. Isgrig (writer, director, producer), Lynn C. Grant (writer, producer) and Kym R. Wulfe (executive producer, head of business and legal affairs) http://www.roman-pictures.comRoman Pictures: a motion picture production company which primarily produces "budget-controlled" feature-length movies that are licensed for distribution and exploitation in the direct-to-video, cable, TV and satellite markets http://www.runningdogfilms.co.ukRunning Dog Films: a new British film company dedicated to making films using cheap and affordable technology combined with proven no/lo budget production practices http://www.shadesofday.comShades of Day: the art of independent film and video producing. Extensive database of cinema related resources http://www.sharpshootertv.comSharpshooter Worldwide: a television production company that specializes in on location filming, any where in the world. Their motto is: "We don't go after awards or publicity. We just do the work." http://www.smileycrew.comSmiley Crew Productions: a California-based film crew specializing in both TV and film. Their main agenda focuses on their popular cable access comedy show, and their pro creative, anti "trend" statements http://www.smorgasbordproductions.comSmorgasbord Productions: a small company involved in the production of multimedia. Film, video, animation, graphic art and comic books are their products Starsmead Production Ltd: comprehensive production services for television and film http://www.studiosatlascolinas.comThe Studios at Las Colinas: a full-service production and entertainment facility located in the heart of the Dallas/Fort Worth Metroplex; offering complete music, film, video, and multimedia production capabilities, as well as parties and events hosting http://www.suedeinteractive.comSuede Interactive: an in-house production facility (located in the NY Metro area) for radio and TV commercials, audio/video/film productions and Internet services (Web site design, search engine placement, e-commerce and hosting) http://www.tafproductions.comTAF Productions: an independent production company, based in the Netherlands, that specializes in executive and unit production services. Additionally, they create their own screen productions Tangled Web Productions: a feature film production company that writes, directs, and produces their own projects. They currently have four projects in development http://www.telenet.bc.caTelenet Communications: video, audio and multimedia production using DV cameras, non-linear editing software and audio foley Terrazas Video: Southern Arizona's largest production facility. Film, video, grip, lighting and stage. Visit their Web site for a complete list of resources TEWS Entertainment: founded by Tim Sullivan and Erik Woods in 1995, responsible for "Of Fortune and Glory," winner of the Best Picture award at the 2000 REwind Video Awards in Calgary http://www.thrae.comThrae Entertainment: your source for no-budget moviemaking on the Web. Provides information and insight into the world of movies without the burden of large financial resources, a place for moviemakers to share their experiences and information about their films http://www.torontopictures.comToronto Pictures: a production company, with its own film-school. Under the leadership of internationally-awarded film director, writer and producer Bruno Pischiutta, they specialize in producing feature films, documentaries and TV series http://www.transworldvideo.comTransworld Video Productions: from idea to shrink wrap; Cable TV to Network. Duplications and conversions to the world formats: NTSC, PAL, SECAM http://www.twodollarpistol.comTwo Dollar Pistol Films: specializing in the writing and production of independent feature films, shorts and documentaries and providing a wide array of digital production services for independent, private and corporate projects http://www.unknownproductions.comUnknown Productions: independent movie production with distribution from Cinematrix releasing, giving the world another entertainment choice http://1aindfilm.twoffice.comVariety Plus Enterprises, Inc.: serving the lower Westchester and New York City community since 1984. They specialize in creating stories, screenplays, and feature length motion pictures http://www.waterfrontchicago.comWaterfront Productions: a Chicago, Illinois-based production company that shoots and edits complete projects on film and video. Separate packages are available for just shooting or editing, if needed http://www.whodat.comWho Dat Music Productions: in Astoria, New York, is the developer of the Who Dat AudioLogo® brand identity for the Internet. We have produced elements for CD-ROM, DVD, Streaming Media for the Internet, Web Site Developers, Multimedia Productions, Interactive Productions, Original or Library Music for Film and Video, Narrators and Voice Over Talent, Web Casting, Corporate Presentation and the entire production if necessary http://www.worldwidefilmworks.comWorld Filmworks: a company designed to create musical/theatre productions, music videos, commercials, and short films, with an eye toward the ever-increasing presence of the Internet as the future of distribution http://www.youngmankang.comYoung Man Kang Films: a writer/director with more than 20 films and more than 50 TV commercials in his portfolio http://www.zone5pictures.comZone 5 Pictures: the source for all of your business media needs, including film and video production, studio photography, Web development, graphic design, feature films and animation/3D

Courses matching "Identity"

Show all 668

Jiwsi Relationships and Sex Education Training (Nov 24)

5.0(2)

By Cwmni Addysg Rhyw - Sex Education Company

Free relationships and sex education training for professionals working in North Wales. Cwmni Addysg Rhyw - Sex Education Company has been commissioned to deliver relationships and sex education (RSE) training to BCUHB staff and partner organisations in North Wales. The aim of this training is to increase confidence and skills to work more effectively with issues concerning sexual health and vulnerable young people. 'The best training I have ever attended!' 'Fun & informative' Attend the first day of the course if you simply want to update your RSE information and attend both days if you want to gain skills and confidence in delivering RSE to individuals or groups. Day one Vulnerable clients Attitudes and values in relation to practice The law and sex Key sexual health issues, including safer sex Gender identity and sexual orientation Communication and sexual health Relevant resources Day two - Additional second day/module for delivering RSE Assessing learning needs Developing purpose and learning outcomes Managing safety and boundary issues Planning, delivering and evaluating sessions Each day will run from 9.30am to 4.30pm via Teams or Zoom. For more information and/or to be added to our mailing list contact Mel Gadd mel@sexeducationcompany.org Terms & conditions: Cwmni Addysg Rhyw facilitates externally funded training to staff that work in the public, private, voluntary and independent sectors. There is significant investment of resources in terms of time, planning and budget to deliver this service and due to repeated incidents of non-attendance without notice it has now become necessary to introduce a charging policy for cancellation and non attendance. Although this course is free of charge to attend we will charge late cancellation administration fees as follows: No notification of non-attendance - £50, less than 48 hours notice of non-attendance £30, Less than 1 weeks notice of non-attendance £25. By registering on the course you agree to these charges on late cancellation or failure to attend. As we usually have a reserve list for our courses we ask you to only book on the course if you can attend the whole day. Arriving late or leaving early will be classed as non-attendance and may be charged as such. We will be delivering this training via Teams or Zoom. It is your responsibility to ensure you can use the platform before booking. If you are unable to access the training on the day because you can't access the platform this will be classed as non attendance and will be charged as such. If you want to check that you can access the training via teams/zoom before booking please contact us. We are happy to set up a quick call for you to check access.

Jiwsi Relationships and Sex Education Training (Nov 24)
Delivered Online
FREE

November Fundamentals of ORSC - Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

November Fundamentals of ORSC - Organisation & Relationship Systems Coaching Training
Delivered Online
£695

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered Online
£2,380

GRAPHIC DESIGN COURSE

5.0(1)

By Graphic Design Courses Birmingham

Be it a career change, an exciting new hobby, perfecting existing skills or simply enhancing professional employment prospects– we help you unlock creativity through our industry aligned all-encompassing Graphic Design Course. " Having done my level 1 and level 2 in graphic design, I felt that I still had gaps in my knowledge and I wasn't comfortable with what I knew. I signed up with Blue Sky Graphics and I am really glad I did. I am definitely better now than when I started and this is all thanks to my tutor and Blue Sky Graphics 🙂 " A Comprehensive Advanced Course The graphic design course is a structured academic and industry aligned advanced course suitable for complete beginners, intermediates or those wanting to improve their existing skill set. The graphic design course is comprehensive and through our teaching methodology is designed to train participants to become professional Graphic Designers. There is an emphasis on corporate illustration, composition, painting and logos as well as advertisement designs while focusing on vectors, lines, features, shapes, and spaces. All this will be integrated into how graphic elements are printed after they are processed in graphic design software for the purpose of visually illustrating emotions and messages. During the course you will be exposed to: advertisements, magazines, newspapers, corporate graphic designs particular to company cultures and brand identity, stationery, letterheads, business cards, logos, books, packaging and much more. The graphic design course teaches you to understand and learn how to operate a labyrinthine yet amazing world of Adobe software. With this software we explore the uses of words, shapes, textures, forms, sizes and colours to communicate by combining ideas and images to make a new concept. Graphic design through common misconception is not just about layout and typography, but much more about ideas behind visual meaning. Graphic design can make a company more successful in the world if it makes communication smart, attractive and able to captivate its audience. Graphic design can effectively be used by businesses to make (or break) their brand identity, increase sales, promote web traffic or promote services and products through advertising on their websites to convey complex data to its readers in a clear way. Elements of graphic design include: Colour, Size, Texture, Line, Shape, Space and, Form. It is important that each element is understood correctly, and this is one of the key principles we teach on our graphic design course. In other terms, graphic design communicates certain ideas or messages through visuals. These visuals can be as simple as a business logo, or as complex as pages of web design. This course goes beyond just the practical side of graphic design and includes the theory and substance behind modern graphic design. Your teacher will guide you on: What salary you can expect at the start of your career? How to get new clients for your business for freelance designers ? How to find work for the new graphic designer starting out in the big world? How to quickly integrate into the graphic design field? How to combine working from home versus working at a studio ? Begin one-to-one online learning with your very own private tutor Interested? Our course is 7 months long, consisting of 1 hour 30 minutes of online one-to-one sessions. When you enrol at Blue Sky Graphics expect at least 90 minutes of class sessions and 2 – 4 hours of homework per week. If we accommodate the course delivery into a shorter time frame, (for e.g. over 4 months instead of 7 months the Flexi 3 doubles from £265.00 to £450.00 over 4 months) the instalment is billed at the delivery rate.  The cost of traditional schooling is typically more expensive than online courses, but in the end it all comes down to how good the tutors are. With our online courses you can gain skills that are a necessity for graphic design remotely. That’s right! Learn the skills needed to use Photoshop, Illustrator, InDesign and portfolio! The online courses cost £1799.00 (VAT inclusive) with no extra hidden costs and there are affordable instalment options too. Pay via debit or credit card or use a payment plan. A deposit of £294.00 is required to secure your position.

GRAPHIC DESIGN COURSE
Delivered Online
£1,799

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered Online
£2,380

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered Online
£2,975

AZ-900T00 Microsoft Azure Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - Describe cloud computing What is cloud computing Describe the shared responsibility model Define cloud models Describe the consumption-based model 2 - Describe the benefits of using cloud services Describe the benefits of high availability and scalability in the cloud Describe the benefits of reliability and predictability in the cloud Describe the benefits of security and governance in the cloud Describe the benefits of manageability in the cloud 3 - Describe cloud service types Describe Infrastructure as a Service Describe Platform as a Service Describe Software as a Service 4 - Describe the core architectural components of Azure What is Microsoft Azure Get started with Azure accounts Describe Azure physical infrastructure Describe Azure management infrastructure 5 - Describe Azure compute and networking services Describe Azure Virtual Machines Describe Azure Virtual Desktop Describe Azure Containers Describe Azure Functions Describe application hosting options Describe Azure Virtual Networking Describe Azure Virtual Private Networks Describe Azure ExpressRoute Describe Azure DNS 6 - Describe Azure storage services Describe Azure storage accounts Describe Azure storage redundancy Describe Azure storage services Identify Azure data migration options Identify Azure file movement options 7 - Describe Azure identity, access, and security Describe Azure directory services Describe Azure authentication methods Describe Azure external identities Describe Azure conditional access Describe Azure role-based access control Describe zero trust model Describe defense-in-depth Describe Microsoft Defender for Cloud 8 - Describe cost management in Azure Describe factors that can affect costs in Azure Compare the Pricing and Total Cost of Ownership calculators Describe the Microsoft Cost Management tool Describe the purpose of tags 9 - Describe features and tools in Azure for governance and compliance Describe the purpose of Microsoft Purview Describe the purpose of Azure Policy Describe the purpose of resource locks Describe the purpose of the Service Trust portal 10 - Describe features and tools for managing and deploying Azure resources Describe tools for interacting with Azure Describe the purpose of Azure Arc Describe Azure Resource Manager and Azure ARM templates 11 - Describe monitoring tools in Azure Describe the purpose of Azure Advisor Describe Azure Service Health Describe Azure Monitor Additional course details: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-900T00 Microsoft Azure Fundamentals
Delivered Online + more
£1,190

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495