Total PHP training course description PHP provides for the creation of dynamic web sites. This hands on training course looks at programming with PHP with an emphasis of building dynamic websites. Forms, state management and database integration are all covered with practicals used throughout the course to reinforce theory sessions. What will you learn Create dynamic web sites using PHP. Write PHP programs. Debug PHP programs. Examine existing code and determine its function. Total PHP training course details Who will benefit: Anyone creating dynamic web sites. Prerequisites: Software development fundamentals Duration 3 days Total PHP training course contents What is PHP? PHP history, dynamic web pages, how PHP works, alternatives to PHP. Downloading and installing PHP. Installing MySQL, installing Apache, platform issues. A first PHP web page A basic PHP script, PHP page structure. PHP comments. Integrating PHP and HTML. PHP forms HTML forms, taking values from forms. PHP and HTML Page inputs, environment inputs. phpinfo(), other form elements, sticky fields, generalised code, tables, forms, form elements, style sheets, JavaScript. Variables operators and expressions Expressions, data types, assignments, scope, constants, HTTP environment variables, getting data from forms using variables. Operators Arithmetic, logical, relational, Boolean, others. Control statements Conditional: if, else, elseif, switch. Loops: while, do while, for, break, continue, exit. Functions Built in functions, declaration, arguments, scope, loading functions from other files, defaulting parameters, call by value/ name. Arrays Indexes, array initialisation, array manipulation, multi dimensional arrays, array functions. String handling What is a string, string functions, matching, extraction, replacement. String operations, cleansing, sprintf, formatting web pages, strops and others, splitting strings, REs. PHP and databases Database structure, Database APIs, MySQL, Creating tables, Editing tables, simple SQL queries using PHP, building HTML tables using SQL queries, SQL injection, security issues, error handling. File I/O Opening, reading, writing files. Permissions, ownership, locking, directories. PHP, cookies and sessions State, Cookie properties, setting cookies, retrieving cookies, expiring/deleting cookies. Sessions, session variables, session IDs. PHP and email Emailing from servers, attachments. Objects OOP, PHP classes, constructors, instances.
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Our Forensic Accounting Course is designed to help investment analysts detect earnings manipulation. It focuses on creative accounting rather than conducting detailed forensic analysis but we explain the tools short sellers employ to detect fraud and some of the techniques we used at hedge funds to identify short opportunities.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
Course Objectives At the end of this course you will be able to: Customise message settings Organise and locate Outlook messages Set Calendar options Manage their Contacts Work with activities using the Journal and Tasks Share their workspaces Manage their Outlook data files ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Configure Advanced Message Options Delay delivery Insert Advanced Characters and Objects Modify Message Settings, Properties, and Options Use Automatic Replies Advanced Message Management Sort Messages Filter Messages Organise Messages Search Messages Manage Junk Mail Manage Your Mailbox Automate Repetitive Tasks Quick steps Rules Auto Archive Advanced Calendar Management Manage Advanced Calendar Options Create Calendar Groups Manage Meeting Responses Advanced Contact Management Edit an Electronic Business Card Manage Advanced Contacts Options Forward Contacts Export Contacts Managing Activities by Using Tasks and Journal Entries Assign and Manage Tasks Record and Modify Journal Entries Sharing Workspaces with Others Delegate Access to Mail Folders Share Your Calendar Share Your Contacts Managing Outlook Data Files Back Up Outlook Items Change Data File Settings Configuring Email Message Security Settings Who is this course for? Who is this course for? This course is designed for experienced Outlook users who need to increase their efficiency in the usage and manipulation of emails, tasks and the calendar. Requirements Requirements Preferably, delegates would have attended the MS Outlook Introduction course.
Microsoft Excel® in Depth: In-House Training The goal of this course is to provide a deeper understanding of Excel and its intricacies and a new ability to use it efficiently producing the best solutions for your projects. This practical course provides a solid background of the features of Excel and a deeper understanding of its features, benefits and uses. This is not a beginner's course in Excel. You will learn some advanced features such as Pivot Tables, Charting, Tables, Sorting, Filtering and Functions. The goal of this course is to provide a deeper understanding of Excel and its intricacies and a new ability to use it efficiently producing the best solutions for your projects. What you Will Learn You'll learn how to: Use functions like IF, AVERAGE, SUMIF, SUMIFS, SUMPRODUCT, INDEX, MATCH, CHOOSE, DATE, and many more Create meaningful charts Use pivot tables Use Conditional Formatting, Data Validation Take advantage of using Named ranges, do sorting, filtering, tables Getting Started The building blocks of Excel, built-in functions, will be examined The basics of formatting your data will be examined Shortcuts and data manipulation will be explored Built-in features like those mentioned in the 'What you will learn' section above will be explored in detail Excel Functions - VLOOKUP, IF, INDEX, MATCH, CHOOSE, SUMIF, SUMIFS, SUMPRODUCT, DATE, so many more Using Named ranges, Data Validation, Sorting, and Filtering Learn the Name manager; Learn the difference between local and global names; Ensure correct access to linked workbooks; Ensure data accuracy; Learn how to use cascading data validation (for example, once a user chooses 'cars', another cell allows only Ford, Toyota, etc.); Sorting by more than 3 fields; Filtering by font, pattern, or value; See your data based on things like dates in the 3rd quarter, or fields where quantity x price is greater than some fixed value Conditional formatting and data formatting Make relevant data stand out Isolate highs and lows Make error cells invisible Learn about Data bars, Icon sets, and Color scales Highlight differences between worksheets Learn all the codes in the Format/Number list Using cell Styles Learn all about alignment, protection, borders, colors and more Pivot Tables Learn how to summarize large amounts of data with a few clicks Learn various ways of presenting the data Learn the various pivot table tools Learn how to customize and format a pivot table to suit your needs Learn how to group data Learn how to use the various options to present your data Charts Learn how to create a chart with one keystroke! Learn the 11 types of built-in charts Learn how to create a chart with one keystroke! Learn how to customize the charts to make the information tell the right story Learn how to use the design, layout, and formatting available to charts in Excel 2007 Learn embedded charts versus chart sheets Learn how to use modify all the pieces of a chart Array formulas Learn how to use the most powerful formulas in Excel Learn how to combine many formulas into one compact array-formula Learn the real power of these formulas and why regular formulas can't do the job Learn how to use built-in array formulas, like TREND or TRANSPOSE
Tutor: Joseph Wilson During this 4-week course, we will use conventional black and white analogue materials in conjunction with non-conventional techniques to create images that stradle ordinary photographic representation and alternative vision. We will deviate from standard darkroom production through the practical exploration of a range of techniques such as Sabattier printing, bas relief printing, cameraless photography, and various methods for pushing and pulling film. These otherworldly techniques – many of which have been the basis for contemporary digital manipulation tools – offer abundant possibility for alternative photographic vision, where emphasis is placed on the transformative potential of darkroom work. This course would be the perfect follow up from our Intro to B&W or Colour Darkroom courses. All materials including photographic film and paper will be provided during this course. However, participants are encouraged to bring along some of their own black and white negatives. Camera know-how and prior darkroom experience are required for this course. Course Outline Week 1: Pushing and Pulling Film We will begin by considering non-conventional ways in which we can rate and process our films, and the various effects of doing so. Presentation and discussion on the uses of these techniques by artists. Shooting 5×4 film at various ISO ratings Using adjustments in time, temperature, dilution, and agitation to Push & Pull the film. Week 2: Possibilities in Print This week we will create prints from our negatives using alternative techniques. Review results in negatives and make contact prints. Sabattier effect printing Multiple exposure printing Bas Relief Printing Week 3: Cameraless Photography We will explore the possibilities of directly exposing through objects and ‘resists’ onto photographic paper. We will cover: Photograms Chemigrams Week 4: Lith Printing An introduction to Lith printing and the possibilities it affords us. A presentation on the history and uses of Lith printing Lith Printing from our negatives Combining non-conventional printing techniques with lith. Courses are subject to minimum enrolment. Please register early, within five days of the start date, to reduce the likelihood of course cancellation. Please read our cancellation policy before booking. Students, anyone over the age of 65, and those in receipt of any form of benefits can claim the concessionary price, offering a 10% discount on the full course price. Valid proof of eligibility must be produced on the first day of the course. Please use the code CONCESSION when prompted at checkout. Stills uses ILFORD PHOTO chemicals on this course that can potentially pose a risk to pregnant and breast feeding women and asthmatics. We take every care to ensure good working practices and adequate ventilation in our darkrooms. If you feel you may be adversely affected, please visit the Health and Safety section of Ilford’s website for further information. General Guidance Notes for Pregnant and Breast Feeding Women and Asthmatics: From a risk assessment standpoint, provided all necessary control measures (such as good working practices, adequate ventilation, and the use of appropriate PPE) are in place then pregnant and breastfeeding women should be able to continue to work safely with photochemical products.Inhalation is the main route by which fumes and gases enter the body, making good ventilation a high priority. Exposure to irritant chemicals that would not affect most people may provoke an asthma attack in a person who already has asthma. For example, low levels of the gas sulphur dioxide can be produced by some ILFORD PHOTO processes. Most individuals would be unaffected but asthmatics may suffer adverse affects. ILFORD PHOTO products include no known human carcinogens, and no substances to which phrase R46 (May cause heritable genetic damage) or R64 (May cause harm to breastfed babies) applies. Most ILFORD PHOTO developers use hydroquinone, and their classification therefore includes R40 (Limited evidence of a carcinogenic effect) and R68 (Possible risk of irreversible effects). Some ILFORD PHOTO chemicals use boric acid or borates. These substances are classified as toxic for reproduction. As a result, the classification of some of the powder developers includes R60 (May impair fertility) and R61 (May cause harm to the unborn child).
Maximize the value of data assets in the oil and gas sector with EnergyEdge's assessment-based training course on Python programming and analytics.
Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.
This one-day workshop will give you a better understanding of the components and operations of an Access database. It is designed to build on a user's existing skills and includes useful action queries to allow greater manipulation of a database. This workshop will help participants: Ensure the integrity of their databases Manage field properties Use the query functions effectively Save time with the query expression builder Create different types of query more quickly Design better forms Link expressions in forms Create better and more useful reports Import and export tables more easily 1 Table relationship integrity Identifying relationships Identifying criteria for data integrity Applying referential integrity Managing relationship join types 2 Table field properties Field properties overview Using input mask field Using default value fields Using field validation rules 3 Query functions Running aggregate function calculations Running sum, average, count, max and min functions Grouping calculated data 4 Query calculations Using query operators and expressions Adding calculated fields to a query Using the query expression builder 5 Action queries Creating make table queries Creating append queries Creating update queries Creating delete queries 6 Designing forms Adding form controls Aligning and arranging form controls Adding pictures and labels to forms Adding new fields to a form Controlling tab order Adding command buttons Adding a combo box control Formatting data using conditional formatting 7 Form expressions (calculations) Using the form expression builder Working with a property sheet within a form Linking expressions within a form 8 Working with reports Creating reports with the report wizard Inserting report fields Formatting fields Inserting report headers and footers Working with a property sheet within a report 9 Grouped reports Creating groups with the report wizard Sorting grouped data Grouping alphabetically Grouping on date intervals Creating sub reports Adding calculations to groups 10 Importing and exporting tables Importing tables into Access Exporting tables from Access Importing and linking data in Access