• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

172 Nature courses delivered Live Online

It's Up To You To End Human Trafficking

By CanarySinging

Survivor and whistleblower of multigenerational human trafficking exposes systemic, organised abuse (human trafficking) in places that are purposed for helping vulnerable people– including victims of trafficking and refugees in the UK. Providing next-level education on the societal structures which enable this abuse, what precisely has led to a global legacy of abuse, and what is needed to correct it. Highly engaging and motivating event to empower the everyman to do their part in abolishing human trafficking. If you want a world without abuse, you have a role in creating it. Find out what that is today. The victims can't wait for tomorrow.

It's Up To You To End Human Trafficking
Delivered OnlineJoin Waitlist
£25 to £30

Trauma: Patterns of the past

By Human Givens College

Essential trauma awareness training on the causes, symptoms and best ways to treat PTSD Join our expert tutor live online to deepen your understanding of trauma and our responses to it – recovery is possible… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am - 4.00pm GMT) Excellent online trauma course! I've worked with complex trauma for over 5 years and there was still plenty for me to take away...KAT MARLOW, PSYCHOTHERAPIST Why do some people become traumatised and others not? What makes an event traumatic? Why are the symptoms of trauma so many and varied? What happens if someone freezes – or experiences a shutdown or dissociative response – during a traumatic event? Live Online Training – Join Ros Townsend on Tues 16th April 2024 to find out the answers to these questions, and many more… You’ll also have time to ask your own questions and benefit from the group discussions. Once you’ve booked you’ll receive emailed confirmation – you’ll get your Zoom link the day before the event. Limited numbers – book soon to ensure your place. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. This inspiring and helpful online course with Ros Townsend, a highly experienced psychotherapist and trainer who specialises in treating trauma, will give you a thorough, clear understanding of how and why we can be impacted by traumatic events, what is happening in our brains, what causes post-traumatic stress (PTS) symptoms, why we respond in different ways (fight, flight, freeze or shutdown/dissociation), how to help someone who is suffering, when to seek professional help – and more. Why take this course Suffering from trauma, whether from a single incident or multiple events spread over the course of many years, can have a significantly detrimental impact on a person’s mental and physical health, and their quality of life. It can also greatly affect the lives of those around them. Since the Covid-19 Pandemic, more people than usual have experienced extremely stressful, distressing and/or frightening events, and many are finding that it has left them with symptoms of post-traumatic stress which can, in themselves, be very frightening. Recovery is possible – understanding is key Understanding what causes PTSD symptoms, how our brains and bodies react to distressing events and what makes us vulnerable to becoming traumatised, are all key to successful recovery. This knowledge creates a firm foundation on which to build successful coping strategies and clarifies what needs to happen to enable successful self-help and recovery. During the day you will also gain a clear understanding of how to spot the ‘early warning signs’ of trauma, before they go on to affect further areas of someone’s life, which red-flag signs indicate that it is time to seek professional help, and how trauma specialists are able to help people recover, from even the most difficult times, effectively – and lots more. Jam-packed full of essential information and important insights, real-life case studies and tips, this trauma course clarifies the different ways trauma can impact on people, leaving you better equipped to help support recovery and build resilience. It is an essential course for anyone who works with distressed people or who wishes to support someone they care for in their recovery from trauma, or for those simply wishing to better understand what they, or someone they care for, are experiencing. You will have plenty of time to ask questions throughout the day as the course is designed as a balance between structured learning, group discussion and activities (it is a live, expanded version of our shorter online course: Understanding Trauma). Ros is a brilliant teacher and presenter. She made the whole course interesting, engaging and informative as well as very supportive. She was also very patient with all our questions!GEMMA ROGERS, COUNSELLOR/COACH What you will learn A clear understanding of what trauma is – and the different survival responses we have evolved to help us deal with it What happens in our brains when we experience a traumatic event Why some people are affected by traumatic events, but not others What makes something ‘a trauma’ What symptoms may indicate that someone has been traumatised Why post-traumatic stress (PTS) occurs and the many different ways it can present The physical and psychological causes of post traumatic stress symptoms such as flash backs, hypervigilance, anger, poor sleep, poor memory, physical pain, difficulty thinking, digestive problems, low mood, apparent over-reaction to non-threatening situations Why PTS symptoms can develop years after a traumatic event The fight, flight and freeze response – its impact on our brain and body, and why it can be triggered inappropriately Why experiencing trauma in a passive survival state – such as freeze, shutdown or a dissociative state – can affect an individual particularly deeply How high emotional arousal impacts on our ability to think clearly Why our brains evolved this way Why some people experience trauma in a passive survival state such as freeze, shutdown or a dissociative state – and why we shouldn’t feel ashamed or guilty if we do The double whammy that comes with the ‘freeze’ response Why some sufferers experience ‘shutdown’ or dissociation as a result of trauma – and how this can lead to feelings of shame or guilt Why anger and other strong emotions can follow when someone comes out of a shutdown state during recovery from trauma How traumatic memories can stay ‘live’, keeping us on constant alert for danger ‘The straw that broke the camel’s back’: why one seemingly small event can tip someone into PTSD after years of exposure to other distressing events The importance of pattern-matching in understanding how our brains work Why post-traumatic stress triggers seemingly inappropriately extreme fear reactions The far-reaching impacts of unresolved trauma, including the development of co-morbid conditions and unhelpful coping strategies, such as addictions How unresolved trauma can lead to depression – the trauma / depression cycle Differences when treating single incident trauma, multiple trauma or ‘complex trauma’ When to seek professional help – spotting the ‘red-flag’ signs that you, or someone you care for, might need further support Where to find effective professional help An understanding of how the rewind technique works; its many advantages and applications The common elements of all effective treatments for post traumatic stress (PTSD) How we need to adapt traditional approaches to treating trauma for those experiencing shutdown or dissociative symptoms in the present Working holistically from the human givens approach The natural way we recover from distressing events What we all need as human beings to live emotionally healthy lives How to best employ self-help strategies to support your own recovery or to help others’ suffering from the effects of trauma How to build resilience and recover from symptoms How to access the ‘recovery zone’ Using breathing techniques with clients suffering from trauma Self-help strategies for improving your mental health and minimising traumatic symptoms A wonderfully informative course – I learned so much about traumaCOUNSELLOR Please note This live online training course is an expanded, live version of our shorter online course: Understanding Trauma. If you work with people with Complex Trauma, you may also like our attended workshops: Complex Trauma: Working effectively with challenging cases. Who this workshop is suitable for Anyone interested in understanding trauma and the many different ways it can present, the physical and psychological causes of post traumatic stress symptoms (PTSD), and what can be done to help – whether for personal or professional reasons. Anyone working with traumatised people including health and welfare professionals, such as: psychologists, counsellors, psychotherapists, mental health nurses, psychiatrists, school counsellors, student wellbeing officers, doctors, nurses, OTs, social workers, health visitors, youth workers, outreach, support workers, clinical psychologists, midwives, welfare officers, youth workers, hypnotherapists Anyone working with traumatised members of public services, such as: firefighters, police, paramedics and military personnel Family members of a traumatised individual who wish to understand more about how they can support their recovery or help them to access support Individuals wanting to understand more about their own experience of symptoms relating to trauma and learn more about what effective support is available – you will find the information on this course hugely helpful. Please note As the course deals with the subject of trauma, participants should be aware that discussion of specifically chosen examples of trauma and PTS symptoms will take place, for illustrative purposes, during the day. These will be generic examples for teaching purposes, however, and will not go into unnecessary detail or be voyeuristic or inherently distressing. Participants on the course will not at any stage be expected or put under pressure to discuss or disclose details of any personal experiences of a traumatic nature that they may have had. Course Programme The ‘Trauma: Patterns from the Past’ live online course starts at 9.15am and runs until 4.00pm. 9.15am Join the Zoom meeting 9.30am Introducing PTS 11.00am Comfort break and discussion 11.30am Understanding PTS 1.00pm Lunch break 1.45pm Red-flag signs – when to seek professional support 2.45pm Comfort break and discussion 3.00pm Self-help strategies 4.00pm Day ends This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

Trauma: Patterns of the past
Delivered OnlineFlexible Dates
£145

One to One deep-dive into your intuitive knowing:Meet The Green man and Woman- Re-sourcing archetypes for our time

4.9(11)

By The Soul Shed

This is an opportunity to go gently into the world of forest story and to explore your intuitive creativity as a wisdom stream you can connect with. Your inner world and neurodiversity is celebrated.

One to One deep-dive into your intuitive knowing:Meet The Green man and Woman- Re-sourcing archetypes for our time
Delivered OnlineFlexible Dates
£85

Weight Management Consultancy Diploma

By Plaskett International

LEARN HOW TO BECOME A WEIGHT MANAGEMENT CONSULTANT WITH THE CLIENT'S HEALTH & WELLBEING AT THE CORE. A MESSAGE FROM THE AUTHOR As you enter into this study, I want you to be fully aware of what lies before you. If you save people from overweight, you will also increase life-expectancy and/or prevent the onset of serious debilitating diseases. There will also be those clients whose life has been long limited in a psychological sense and you will be able to help them to restore their sense of verve and vitality so they can again live life to the fullest extent. This will be done through learning special expertise both technically and in person-to-person relations. With these words of encouragement, I warmly welcome you to this course of study where the amount of potential job satisfaction is incalculable. DR. LAWRENCE PLASKETT Course Duration 12 months Study Hours 200 hours Course Content 13 sections Course Fee £475 Course Overview The Plaskett Weight Management Consultancy course will provide you with a detailed, systematic and scientifically-based training, fuller than any other we know of in the field. It will enable you to practise as a well-informed Weight Management Consultant and most importantly, you will be able to help and support individuals in their quest to lose weight whilst maintaining health and well-being. Learn the Basic Elements of Nutrition You will gain an understanding of the basic elements of nutrition with a focus on the key nutrients in order to avoid deficiencies when working with weight loss clients. Create Individualised Weight Loss Programmes You will develop the confidence to be able to make informed choices from a wide span of weight loss options and avoid the use of rigidly fixed methods, thereby delivering programmes best suited to individual needs. Become a Skilled Adviser You will learn the skills to be able to counsel on a one-to-one basis, we believe that this favours the resolution of individual circumstances and problems. You will receive the training to see your clients through every stage of the process, thereby maximising their chances of success. Expand Practice of Current Health Professionals In addition to those wanting to set up practice as a Weight Management Consultant, this course is ideally suited to current health & fitness professionals looking to enhance their practice. BREAKDOWN OF THE COURSE SECTIONS The Weight Management Consultancy Diploma includes the following 13 sections: SECTION 1 BASIC SCIENCE SUPPORT Whilst our main concern will be with weight loss, we need to understand some of the basic aspects of nutrition. These deal with the key nutrients that we have to control to reduce weight. They will also help us to understand how to lose weight without developing deficiencies.  In Section 1, we begin the study of nutrients and foods by looking at the main bulk nutrients that our diets contain: protein, carbohydrate and fat. Before one can consider individual vitamins and minerals, one has to know about the nutrients that make up most of our diets, namely the bulk nutrients. These are the suppliers of food energy and ultimately help to decide an individual's size. You will need to understand these so as to manipulate them with skill. Areas Covered What are the bulk nutrients? Chemical elements contained in the bulk nutrients Proteins Carbohydrates Fibre Fats The energy reserve role of fat The lipoproteins of the blood SECTION 2 UNDERSTANDING THE FIELD & NATURE OF THE PROBLEM This section introduces the basic ideas of the training. The purpose of this course of training is to enable the student to help others who are overweight or obese to lose weight, and to do so in a professional manner. At the same time, it aims to motivate you and empower you to set up a practice as a ‘Weight Management Consultant’ that will lead to your gaining a good reputation in this field, developing a panel of satisfied clients and bringing you both status and income.  Since losing weight is not easy, one has to be aware of all the different methods and ramifications that are a part of this intriguing subject. The professionalism comes from knowing a number of different “ways in” to help the clients and also from being able to develop awareness of the individuality of each client. This will put you in a position to find the best and most successful route to weight loss for each person who consults you. This will mean giving individual advice, not just the same advice to everyone. By recognising individuality we earn the client’s trust and appreciation and we also increase the chances of achieving the fullest possible success by being in a position to find individual solutions to each client’s problem. Areas Covered The aims of the work The clients’ motives The clients themselves The clients’ knowledge of nutrition The place of psychology The arithmetical equation of body weight Ways of working Getting fat is all too easy – we review how it happens Definition and classification: criteria for weight normality SECTION 3 THE THEORY OF THE CAUSES OF OVERWEIGHT & OBESITY In this section we explore 'The Theory of what Causes Overweight and Obesity'. We look at the underlying reasons for this current epidemic scale of the problem in developed societies throughout the world. Understanding this will give you an insight into what needs to be done. The Weight Management Consultant clearly needs to understand as fully as possible the causes of obesity in order to be able to formulate good advice. It is necessary to understand that, although the ultimate cause is always eating more than the body requires, that factor is modified by many subsidiary factors. One, that always interests clients, is whether or not one may be predisposed by one’s inheritance to put on and retain weight, so we deal with this question. Areas covered Relative effect of genetics and environment Hormonal disturbance in obesity Slower than normal rates of energy expenditure The role of fat cells Role of the enzyme lipoprotein lipase SECTION 4 THE HEALTH CONSEQUENCES OF EXCESS WEIGHT It is well known that being overweight or obese increases the chances of contracting chronic illnesses. This section examines the types of illnesses involved and the way that their incidence is affected by body weight. From the standpoint of a Weight Management Consultant, the use of this information is to present clearly the vital benefits that your work can bring to your clients in terms of freedom from illness. This knowledge can augment your job satisfaction, especially when you can see the client’s health condition improving as weight comes down. That can be expected to happen sometimes, but of course not always. So, potentially this information can serve to inform your clients about the degree to which slimming down from an overweight or obese condition can help them to avoid very negative health consequences. By passing on parts of this data to some carefully selected clients, you may perhaps either improve their flagging motivation, or increase their satisfaction level with their early results or with the efforts they are making. Areas covered The connection between overweight and ill health The risk of early death Illness and death from cardiovascular disease Illness and death from diabetes mellitus Illness and death from hypertension Illness and death from respiratory problems Illness and death from gallbladder disease Illness and immobility from arthritis Illness from gout Illness and death from cancer SECTION 5 FIRST PRINCIPLES OF CORRECTING EXCESS WEIGHT In this section we approach the practical side of the Weight Management Consultant’s job. The greatest skill required of the Consultant is that of formulating the advice in a way that combines efficacy with client acceptability. The mistake most often made in the approach to weight reduction is to employ only one method yet in pursuing reduction in a person’s weight, it is best to come at the problem from multiple angles simultaneously. The person’s diet may well have to be the first and foremost approach however, the main alternative approaches involve several different ways of preventing excess food materials from being stored, leading to overweight.  If control of the diet is the only method one employs, then so much depends upon strict dietary control that the will and the motivation of the client may be too severely tested. However, an approach in which dietary control takes pride of place, but is supported by a number of other approaches, is more likely to find client acceptability and is therefore more likely, ultimately, to be successful. In this section we list these “prevention of storage” approaches before dealing more fully with the diet. Areas covered Strategy of weight control Reduction of food intake The use of balanced hypocaloric diets Strategies for reducing food intake in practice Using foods intended to increase metabolic rate Mixtures of the various strategies SECTION 6 REDUCING WEIGHT THROUGH DIET & DIETARY COMPOSITION The principal purpose of this section is to understand the scope that we have to reduce food calories in the diet without necessarily reducing the total weight of food consumed. It looks closely at understanding and measuring food energy. Working in this way with diet is kindest to the clients and makes fewer demands upon their efforts and their will to succeed. Areas covered Understanding food energy The make-up of daily diets What does the body have to do with tis energy? Water content of foods The differing energy contents of food dry matter Substituting low-calorie for high-calorie foods The first stage of calorie reduction Combining diet with exercise A further stage of calorie reduction SECTION 7 SELECTING INDIVIDUAL FOODS The previous section talks mainly about the first principles of reducing calorie intake while keeping the weight of daily food dry matter level. This is done mainly by varying the extent to which each food class contributes to the overall diet; we simply reduce the proportions of those food classes with the higher calorie content. This section now looks within food classes to pick out those foods that, individually, have lower calorie content than the average for foods within the class concerned and make the best contribution to an individual client’s diet. This is a further step to calorie reduction without loss of food bulk. Areas covered Different foods within any given class have different calorific values Choosing foods within food classes for calorie reduction Specific recommendations for individual foods within each class Care needed in using the information Calorie contents of the “more suitable foods” Dietary results from substituting individual foods The necessary provision of dietary fat The quality of dietary protein The quantity of dietary protein Choosing foods for overall dietary suitability SECTION 8 BUILDING YOUR KNOWLEDGE OF FOODS INTO DIETS In the Sections that have gone before, we have noted several key strategies aimed at reducing the client’s intake of calories. This section gets down to the key job of building and structuring a diet to help each particular client - the aim now is to address the actual prescribing of diets to enable you to build upon the principles already learned and to give the client a workable diet that can achieve his or her aims. Areas Covered The adjusting and re-balancing of the food classes Calculating the food replacements Targeting individual foods SECTION 9 FIRST LOOK AT CONDUCTING CONSULTATIONS This section takes you through managing the consultation, helping you to structure the activity to provide a satisfactory experience for your clients. This is the basis for a good approach to weight reduction.  The section culminates in the provision of example diet sheets with guidelines according to food classes and guidelines according to mealtimes and considers the benefits of both. Areas Covered The consultant’s surroundings and manner Direction of the early conversation Collection of the dietary data Weight-loss ideas come to you during the data collection Identifying the largest food contributions to overweight Balancing the food classes Writing down the guidelines Substitution of individual foods Reduction in the food bulk eaten Integrating the entire diet Example diet sheets SECTION 10 COUNTING CALORIES. BENEFITS OF EXERCISE. THE KETO DIET. In section 10 we cover the method of calculating the calories in everyday life. We look at the benefits of exercise for suitable clients and discuss more specific diets such as the ketogenic diet.  Areas Covered Calculating the calories The benefits of exercise The ketogenic diet SECTION 11 PROMOTING GOOD HEALTH. UNDERSTANDING DRUG TREATMENTS. FOLLOW-UP GUIDELINES. Brings us to the section where we set about designing slimming programmes that are not only effective at weight loss, but also promote good health. To give you an insight into the potential problems, we also look at the drug treatments given for overweight by doctors. We also take you through the guidelines for follow-ups after the first consultation. Areas Covered Slimming programmes to promote good health Understanding drug treatments for overweight Follow-up guidelines SECTION 12 USE OF SUPPLEMENTS TO PROMOTE LOSS OF WEIGHT This section deals with non-food substances, or supplements that with help with weight loss. It looks at how they actually achieve this and discuss their effectiveness and safety implications for the individual. These include some micronutrients, herbs, enzyme inhibitors and sequestering agents. Areas Covered Inhibition of fat absorption Changing body composition Substances encouraging increased thermogenesis Appetite suppressants Enzyme inhibition Prevention of fat synthesis Nutrients that may accelerate metabolism Appendix 1 – some abstracts of key articles Appendix 2 – summary of modes of action SECTION 13 MANAGING This rather substantial last section deals with a fuller and final part on “Managing the Consultations”. This further develops your consultation skills and objective setting in weight management practice. It also addresses the tricky question of compliance and weight regain and how to avoid it. Finally, it looks at “Running your Practice as a Business” to ensure that you have a grasp of the business principles that you will need. Areas Covered Managing the consultations – basic methodology Note on progressive reduction in energy needs Construction of the overall prescription – different components Running your practice as a business Appendix (more about why the slimming process slows down) TESTIMONIALS Here's what students have to say about the course Mrs E. Marriott UK “The Plaskett course in Weight Management Consultancy has been a really good introduction into the importance of nutrition and balancing food groups to make up a healthy diet plan for those who are obese and wishing to lose weight. It would be good if you want to do it for your own understanding or if you are looking for a step into a professional qualification or practicing yourself. The tutors communicate with you and give you detailed feedback on assignments and the work is achievable within a year, quicker if your apply yourself. There is a lot of information in the course surrounding basic nutrients, composition of foods and on how to set up and run your own practice”.

Weight Management Consultancy Diploma
Delivered OnlineFlexible Dates
£88 to £475

CNSE-AWS Check Point Network Security Expert for AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke security environment. Describe the function of the Cloud Management Extension. Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in AWS. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in AWS. Describe the workflow for configuring scaling solutions in AWS. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in AWS. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in AWS. Explain the steps required for troubleshooting Scaling Solution issues in AWS. Describe the steps required for troubleshooting clusters in AWS. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Create an SSH Key Pair. Create a VPC. Deploy an SMS. Connect to SmartConsole. Review the IAM Role. Configure the Cloud Management Extension. Configure the Access Control Policy. Create the AWS Data Center Object. Create Access Control Policy with a Data Center Object. Create the AWS VPC Spokes. Deploy the Web Servers into the Spoke VPCs. Create the AWS Auto Scale Deployment. Create the External and Internal Load Balancers. Create the VPC for the Auto Scale Deployment. Create the VPC Peers. Deploy the CloudGuard Cluster Template. Create the AWS VPN Gateway. Configure the Tunnel Interfaces. Configure the Static Routes. Configure the Network Objects. Configure the VPN Community. Configure the Security Policy. Test the Traffic. Troubleshoot the CloudGuard Controller. Debug the CloudGuard Controller. Debug the Cloud Management Extension Additional course details: Nexus Humans CNSE-AWS Check Point Network Security Expert for AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-AWS Check Point Network Security Expert for AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNSE-AWS Check Point Network Security Expert for AWS
Delivered OnlineFlexible Dates
Price on Enquiry

CNSE-Azure Check Point Network Security Expert for Azure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke cloud security environment. Describe the function of the Cloud Management Extension Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in Azure. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in Azure. Describe the workflow for configuring scaling solutions in Azure. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in Azure. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in Azure. Explain the steps required for troubleshooting Scaling Solution issues in Azure. Describe the steps required for troubleshooting clusters in Azure. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. Course Outline Deploy a Security Management Server. Connect to SmartConsole. Configure Azure Active Directory and the Service Principle. Install the Cloud Management Extension. Configure the Cloud Management Extension. Configure the Access Control Policy. Assign the Service Principle. Create the CloudGuard Controller Object. Configure Access Control Policy with a Data Center Object. Deploy the Spoke vNets. Create the Spoke Route Table. Deploy Web Servers into the Spoke vNets. Deploy the Virtual Machine Scale Set. Assign the Service Principle to the VMSS Resource Group. Enable Indentity Awareness on the VMSS. Create Load Balancer Rules. Create vNet Peers. Create Web Server Access Control policy. Deploy the Azure High Availability Solution. Create the Cluster Object. Configure the vNet Peering. Create the Internal User Defined Routes. Create the Security Policy for Internal Traffic. Test the Internal Traffic. Troubleshoot the CloudGuard Controller. Debugs the CloudGuard Controller. Debug the Cloud Management Extension. Additional course details: Nexus Humans CNSE-Azure Check Point Network Security Expert for Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-Azure Check Point Network Security Expert for Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNSE-Azure Check Point Network Security Expert for Azure
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Audience for this course This course is designed for system administrators responsible for creating OpenShift Enterprise instances, deploying applications, creating process customizations, managing instances and projects. Prerequisites for this course Have taken Red Hat Enterprise Linux Administration I and II (RH124 and RH134), or equivalent Red Hat Enterprise Linux© system administration experience Be certified as a Red Hat Certified System Administrator (RHCSA), or equivalent Red Hat Enterprise Linux system administration experience Be certified as a Red Hat Certified Engineer (RHCE©) Overview Learn to install, configure, and manage OpenShift Enterprise by Red Hat instances - OpenShift Enterprise Administration (DO280) prepares the system administrator to install, configure, and manage OpenShift Enterprise by Red Hat© instances. OpenShift Enterprise, Red Hat's platform-as-a-service (PaaS) offering, provides pre-defined deployment environments for applications of all types through its use of container technology. This creates an environment that supports DevOps principles such as reduced time to market and continuous delivery. - In this course, students will learn how to install and configure an instance of OpenShift Enterprise, test the instance by deploying a real world application, and manage projects/applications through hands-on labs. - Course content summary - Container concepts - Configuring resources with the command line interface - Building a pod - Enabling services for a pod - Creating routes - Downloading and configuring images - Rolling back and activating deployments - Creating custom S2I images This course will empower you to install and administer the Red Hat© OpenShift© Container Platform, with hands-on, lab-based materials that show you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. This course is based on Red Hat© Enterprise Linux© 7.5 and Openshift Container Platform 3.9. OpenShift is a containerized application platform that allows your enterprise to manage container deployments and scale your applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). 1 - INTRODUCTION TO RED HAT OPENSHIFT ENTERPRISE Review features and architecture of OpenShift Enterprise. 2 - INSTALL OPENSHIFT ENTERPRISE Install OpenShift Enterprise and configure a master and node. 3 - EXECUTE COMMANDS Execute commands using the command line interface. 4 - BUILD APPLICATIONS Create, build, and deploy applications to an OpenShift Enterprise instance. 5 - PERSISTENT STORAGE Provision persistent storage and use it for the internal registry. 6 - BUILD APPLICATIONS WITH SOURCE-TO-IMAGE (S2I) Create and build applications with S2I and templates. 7 - MANAGE THE SYSTEM Use OpenShift Enterprise components to manage deployed applications. 8 - CUSTOMIZE OPENSHIFT ENTERPRISE Customize resources and processes used by OpenShift Enterprise. 9 - COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in the course. 10 - NOTE: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us. Additional course details: Nexus Humans Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280)
Delivered OnlineFlexible Dates
Price on Enquiry

Technology and innovation and its profound impact on financial operations

By FD Capital

Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations

Technology and innovation and its profound impact on financial operations
Delivered OnlineFlexible Dates
FREE

Red Hat High Availability Clustering (RH436)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat High Availability Clustering (RH436)
Delivered OnlineFlexible Dates
Price on Enquiry

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered OnlineFlexible Dates
Price on Enquiry