This course is not suitable for total beginners. To attend this course, you must already have some experience with industrial machines and be able to operate and set up a walking foot independently, or have attended our MODULE 3 – INDUSTRIAL MACHINE TRAINING. Summary of topics covered in the class: – Pattern making, pattern development and pattern vocabulary – Leather preparation, pattern placement, and leather marking – Leather cutting, gluing, and reinforcing – Patterns development, assembling and making for different card holder constructions By the end of the tuition, you will have: – Developed your understanding of pattern drafting and pattern development – Understood the concept of seam, folding, and trimming allowances when drafting patterns – Created some finished patterns, constructed and completed up to 3 finished card holders (depending on your personal abilities the quantity might change) – Learned how to use your patterns to correctly cut your material, minimising waste and using the best parts of a hide/skin – Worked with a variety of tools for pattern making and leatherworking, as well as various types of leather – Developed essential leather craft skills such as preparation, marking, finishing, cutting, and more – Obtained a basic understanding of the differences and best uses of reinforcements, stiffeners and stabilisers Included in the course: You will receive useful paper handouts containing: – A list of tools and materials used during the lesson(s), with descriptions and usage instructions – A list of recommended suppliers for leather and fittings, both in London and online – A glossary containing pattern making terms and general guidelines for pattern drafting All materials are included, there are no additional costs. Find all modules here: https://the-london-leather-workshop.cademy.co.uk/
This is a practical 2-day group tuition during which you will receive an overview of basic leather craft and hand sewing skills and techniques and create your own hand-sewn leather bag to take home with you.The class will take place in our London workshop, where you will see how a leather craft studio is equipped and receive practical demonstrations of common leather and bag-making methods.You will be able to choose your project from a selection of different medium-sized bags. You will also be able to pick the leather type, color and hardware you prefer from our stock. All our leathers are beautiful, rescued Italian vegetable-tanned leather from leading tanneries and fashion brands.You will receive an introduction to leather types, including how to mark, cut, edge finish, and hand sew leather using saddle stitching, as well as apply simple fastening hardware. Relevant, useful, and informative handouts and lists of leather and tool suppliers will be provided.At the end of the tuition, you will have:– Gained an understanding of leather types and tanning methods– Been instructed on the use of common fastenings and closure techniques– Received an overview of the correct use of tools for preparing, marking, cutting and punching leather– Learned how to use, read and place patterns– Learned how to saddle stitch leather and understood the different tools and materials used in the technique– Understood and practiced leather craft techniques such as beveling and burnishing– Created your own hand-stitched leather bag to take home with you. ABOUT THE FINAL PROJECT:The final bag you will create will be a small or medium-sized leather bag from a choice of designs. You will be presented with various shapes to choose from, both feminine and unisex, such as handbags, crossbody bags, bum bags, buckets, and more. WHY YOU SHOULD CHOOSE ONE OF OUR COURSES:Our classes are different: we are renowned for personal attention to each and every student and importantly the students’ onward path in the industry is paramount to us. All of our courses focus on building useful, practical skills and providing essential information for our learners to be able to actually develop and use their own ability in continuing their journey.Each topic is explained in easy-to-follow steps, and all lessons are organised so that the techniques used can be replicated by students independently.We strongly encourage and support skill sharing and our main focus is to enable more people to access and flourish in our industry. INCLUDED IN THE COURSE:You will be provided with useful handouts which contain:– A list of recommended suppliers for both leather and fittings (physically in London and online)– A glossary containing information about leather types and characteristics
Course Information Our comprehensive course is used as a gateway to those stepping into the world of auditing clinical studies. Tailored for those already acquainted with Good Clinical Practice (GCP) and those transitioning from other audit disciplines, this programme stands as a pivotal guide. Pre-existing knowledge of GCP will significantly enhance your learning experience in auditing against these guidelines. How is this course run? Engage in immersive workshops providing hands-on practice with auditing techniques in a GCP context. Our seasoned tutors, boasting extensive audit experience, intertwine theory with practical insights drawn from their own professional journeys. What will I learn? A comprehensive understanding of the historical backdrop and objectives driving Good Clinical Practice, incorporating the latest industry developments Solid grounding in quality assurance activities aligned with regulatory standards Insight into potential pitfalls within clinical trials and the pivotal role of auditors in addressing these issues Clarity on the roles and responsibilities inherent to clinical trials auditing Exposure to a diverse range of audit techniques complemented by illustrative examples and supportive documents A nuanced understanding of regulatory inspectors' activities Expanded professional networks to propel your auditing career forward. Benefits include: A clear understanding of the role of the auditor under Good Clinical Practice improved audits Improved Good Clinical Practice compliance for your clinical trials. This course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Examine particular aspects of Good Clinical Practice. Tutors Tutors will be comprised of (click the photos for biographies): Rosemarie Corrigan EVP Global Quality, Worldwide Clinical Trials Cathy Dove Director and Owner, Dove Quality Solutions Julie Kelly Associate Director, Clinical Quality Assurance, Corcept Therapeutics Susana Tavares Director of Research Quality Assurance, - Programme Please note timings may be subject to alteration. Day 1 12:30 Registration 13:00 Welcome and Objectives for the first day of the course 13:30 Laying the Foundations Introduction to the clinical development process, the concepts of quality assurance, quality control and audit. 14:30 Break 15:00 Patient Protection Requirements for informed consent and ethics committee. Access to source documentation. Including a patient protection exercise. 16:05 Workshop 1 - Case Study on Informed Consent 16:45 End of Day Questions and Answers 17:00 Close of Day Day 2 08:50 Questions and Answers from Day 1 09:00 Effective Site Audits The procedures involved in selecting and setting up audits at investigator sites. 09:40 Workshop 1 - Planning the Effective Audit 10:30 Break 10:45 Source Data Verification The need for and purpose of verifying data. 11:25 Workshop 2 - Source Data Verification 12:30 Lunch 13:30 IMP Management The requirements surrounding the distribution of investigational medicinal products. Accountability from release to destruction. 14:15 Critical Document Audits The conduct of other study specific audits including protocols, databases and reports. 15:00 Break 15:15 Non-compliance Determining the acceptability of data. 16:00 Fraud - Fact or Fiction? How to identify fraud and its consequences 16:45 End of Day Questions and Answers 17:00 Close of Day Day 3 08:50 Questions and Answers from Days 1 and 2 09:00 Auditing Third Parties A review of audits of contract research organisations. 10:00 System Audits The concept of auditing processes across many clinical trials, including a practical exercise in process mapping. 10:45 Break 11:00 Workshop 3 - Process Mapping 11:45 Effective Audits Where theory meets reality. 12:30 Lunch 13:20 Audit Reports - Closing the Loop An examination of the processes which follow the evidence gathering phase of the audit. 14:20 Workshop 4 - Audit Reports Audit reports, corrective and preventive action. 15:00 Break 15:10 Regulatory Inspection Auditors and regulatory inspections -how the QA team can help the organisation to perform during a regulatory inspection. 15:55 Final Questions and Answers 16:10 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 17 Points Development Level Develop
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
The IRATA Level 1 is the entry level into the rope access industry. An IRATA Level 1 technician will be able to perform a range of rope access manoeuvres and have an understanding of the current legislation. An IRATA Level 1 is required to be supervised by an IRATA Level 3 technician.
COBOL training course description A hands on training course providing an introduction to COBOL. What will you learn Write COBOL programs Debug COBOL programs Examine existing code and determine its function. COBOL training course details Who will benefit: Programmers working with COBOL. Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. Duration 5 days COBOL training course contents Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. COBOL statement structure COBOL words, format of statements. Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. Program design Design techniques, design considerations, procedure names, program structure. Printing Printed output, Write, advancing option, editing characters; Initialize. Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. Declarative routines Clauses. Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.
Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.
Satellite communications training course description This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. What will you learn Explain how satellite communications work. Explain how RF works Explain the architecture of satellite systems. Use spectrum analysers. Satellite communications training course details Who will benefit: Anyone working with satellite systems. Prerequisites: None. Duration 3 days Satellite communications training course contents Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. Test and measurement Theory and practice of Spectrum Analysers.