• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

878 Open courses in Belfast delivered Live Online

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered OnlineFlexible Dates
£1,330

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
£2,975

Level 3 Certificate in Counselling Skills

By Step Into Learning

Do you want a rewarding career working directly with people? Would you like to make a difference to their everyday lives? If you are warm, open and compassionate and can bring a patient and non-judgemental attitude, a career in counselling could be for you. The Level 3 Certificate is the second stage on the journey to becoming a qualified counsellor.

Level 3 Certificate in Counselling Skills
Delivered OnlineFlexible Dates
£811

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Thinking with Critical Insight

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals who want to make the best decisions and develop creative and elegant solutions to challenging problems will benefit from this course. Overview Enable you to evaluate, identify, and distinguish between relevant and irrelevant information Engage critical thinking through curiosity and your ability to ask good questions Apply the eight best practices of critical thinking in practice Leverage open-mindedness to become more receptive and highly tuned for new ideas Students will learn to explore challenges, defy incorrect assumptions, and look at things with new and differing perspectives, incorporating these insights into your thought processes, and enabling them to find solutions to even the most difficult tasks. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. The Challenges of Modern Thinking Becoming a Rational Thinker Critical Thinking in Application Applying Reason Developing Open-Mindedness Stepping Out of Your Comfort Zone Avoiding Jumping to Conclusions Expecting and Initiating Change Being Ready to Adapt Thinking Logically 2. Critical Thinking Best Practices Listening Actively Evaluating Information Making Assumptions Watching Out for Bias Asking Clarifying Questions Performing SWOT Analysis Benefitting from Critical Thinking 3. Putting It All Together Changing Your Perspective Considering Other Viewpoints Dealing with New Information Solving Problems Identifying Inconsistencies Asking Why Evaluating the Solution Retaining Your New Skills Reflecting and Learning from Mistakes Asking Questions on an Ongoing Basis Additional course details: Nexus Humans Thinking with Critical Insight training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Thinking with Critical Insight course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Thinking with Critical Insight
Delivered OnlineFlexible Dates
£1,500

Complete Perl programming

5.0(3)

By Systems & Network Training

Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.

Complete Perl programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Elite EA PA Forum 🇳🇿

By Elite Forums Events

Elite EA/PA Forum We are delighted to announce that the Elite EA/PA Forum for Australia & New Zealand will be on the 25th of September 2025. Our workshop aims to: Enhance your influence and impact by mastering assertive communication, negotiation, and self-advocacy skills. Stay composed and solution-focused in high-pressure situations with practical tools for crisis management and clear decision-making. Embrace evolving technology by understanding how AI and automation can streamline your role and boost efficiency. Future-proof your career by building strategic value, resilience, and adaptability in an ever-changing professional landscape. Keynote Address with Q&A from the audience: What to expect from Sam's Keynote: With over 30 years supporting leaders at the highest levels, Sam Cohen brings a wealth of insight, experience, and stories (the kind she can share) to the stage. From 18 years serving within The Royal Household - including as Deputy Private Secretary and Press Secretary to Her late Majesty Queen Elizabeth II - to working with The Duke and Duchess of Sussex, running the Prime Minister’s Office at Downing Street, and serving as Chief of Staff to the global CEO of Rio Tinto, Sam’s career is a masterclass in discretion, diplomacy, and delivering at the top. In this exclusive keynote, Beyond the Role, Sam will explore how Executive Assistants don’t just support leaders - they shape leadership, drive strategy, and build legacy from behind the scenes. Join us for this rare opportunity to hear from someone who’s been at the epicentre of power - and bring your questions! The keynote will include a live Q&A, where you can ask Sam about her remarkable career, leadership insights, and how to truly excel in high-performance environments. (Don’t ask her what the Queen kept in her handbag - she’s not telling.) Sam Cohen Career Bio: Sam Cohen has spent the last 30 years working to support leaders in the public and private sectors. Sam spent 18 years serving The Royal Household, as Deputy Private Secretary to Her late Majesty Queen Elizabeth II and Press Secretary to The Queen. Sam also served as Private Secretary to The Duke and Duchess of Sussex. Following this time, Sam worked as Director of the Prime Minister’s Office at Downing Street under Boris Johnson and, most recently, was Chief of Staff to the global CEO at Rio Tinto. Source: ABC News - YouTube Channel. Facilitator - AM: The Future-Proofed Assistant: Speak Up, Stand Out & Shape Your Career Path How to reimagine your Assistant role in 2025 and beyond - How the EA role is evolving (and what Executives now expect) & why Assistants who think like strategists will be indispensable Assertiveness as an Assistant – The key to retaining your role & the difference between being ‘helpful’ and being ‘heard’ Self-Advocacy as a Career Growth Strategy – The importance of advocating for your career development, workload boundaries and recognition Own Your Professional Future - Map your career development. Whether you're an EA for life or looking to a role beyond in the future, this is for you. Ruth Kilah Career Bio: Ruth is an international executive career coach and founder of Hoxton Hyde – Executive Career Coaching & Mentoring, delivering 1:1 and group programs for experienced Executive Assistants. She specialises in helping EAs step into higher-level roles, increase their income, and expand their professional impact. With 14 years’ experience supporting C-suite executives in Australia and the UK, Ruth brings deep industry insight and a strategic approach to career development. She empowers Assistants to gain clarity on their next move, adopt a strategic mindset, communicate their value effectively, and lead their own growth conversations with confidence. A former EA turned Stakeholder Relations and Project Manager, Ruth launched Hoxton Hyde in 2018 after spotting a clear gap in the market for tailored coaching for career-driven EAs. She is a recognised member of the World Administrators Alliance and a respected thought leader in the EA space, regularly sharing insights via LinkedIn and Instagram. Ruth is also a certified fitness and wellness coach, passionate about helping Assistants achieve long-term career fulfilment through intentional development and well-being. Panel: Crisis Mode: What to do when everything goes wrong Master a step-by-step approach to prioritising and problem-solving under pressure. Strengthen emotional resilience and calm decision-making during unexpected disruptions. Learn how to communicate clearly and lead from behind in high-stress situations. Emma-Kate Bos Bio Emma-Kate works alongside the CEO at Squadron Energy, one of Australia’s leading renewable energy companies. With over 28 years of experience in Executive Assistant and Operational roles supporting business leaders in professional services, politics, membership industries, sporting and not-for-profit organisations, Emma-Kate has a deep understanding of business support roles and has managed large teams of assistants and receptionists. She is passionate about developing and mentoring team members Emma-Kate holds an Associate Degree in Law, Mini MBA and Certificate in Public Relations. Sepi Nowlands Sepi has also worked as an EO for Deloitte and spent 18 years previously as an Executive Assistant at the ATO, Law Council of Australia, Grains Research and Development Corporation and Air Services Australia. Holly Clareburt Hollie Clareburt is an experienced Executive Assistant, currently supporting the Managing Director of Microsoft New Zealand and the Chief Partner Officer. Known for her professionalism and discretion, she excels in providing high-level support in fast-paced, executive environments. Prior to Microsoft, Hollie was Executive Assistant to the Chief of Corporate & Enterprise Systems at BECA, and previously supported the CEO at SKY News New Zealand. Her career reflects a strong track record of reliability, organisation, and executive partnership. Liv Wilson With over 20 years of experience across banking, government, creative industries, and global tech, Liv has supported senior leaders at companies including LinkedIn and Slack. She brings a strategic lens to the business support function, with deep expertise in operations, leadership enablement, and organisational effectiveness. As a passionate advocate for elevating the role of Executive Assistants, Liv has led women’s networks, championed DEI and social impact initiatives, and continues to push for recognition of business support as a critical driver of business success. She is currently working on her side hustle business - collaborating with executives, entrepreneurs, and small business owners to amplify their impact by removing operational barriers, optimising systems, and unlocking their capacity to lead and grow. Facilitator - PM: Justin Kabbani AI Is Not Here to Replace You. It's Here to Upgrade You. We'll explore Justin's proven 3P framework: Priming – How to set up AI like a strategic advisor by feeding it context, tone and mindset Prompting – How to craft clear, structured instructions to get consistently great results Producing – How to turn AI outputs into high-leverage work that makes you stand out Your session outcomes: Real examples from admin professionals already using AI to elevate their work Prompts you can copy, adapt, and test live Interactive exercises to build confidence fast A practical challenge to implement right after the session If you’ve been overwhelmed by AI, or underwhelmed by its impact, this session will change that. You'll leave with tools you can use today, and a mindset you’ll carry forward for the rest of your career. Justin Kabbani Career Bio: Justin Kabbani is one of Australia’s most in-demand AI trainers and keynote speakers, known for making AI feel simple, powerful, and immediately useful. He’s worked with brands like Uber, Treasury Wine Estates, and Udemy, helping their teams embed AI into daily workflows, strategic planning, and executive communication. Over the past two years, Justin has trained more than 2,000 professionals across Australia and beyond, consistently earning feedback like “mind-blowing,” and “game-changing”. His signature Prime, Prompt, Produce framework has transformed how business leaders, executive assistants, marketers, and teams think, work, and communicate with AI, without needing to be “tech people.” Justin believes AI isn’t here to replace people. It’s here to take the robotic work off our plate, so we can focus on what humans do best. LinkedIn: https://www.linkedin.com/in/justinkabbani/ Website: https://justinkabbani.com/ Speed Connections Networking Session Join us for Speed Connections, a lively 30-minute networking session designed to foster meaningful connections in a fun, fast-paced environment. Every 10 minutes, attendees will be placed into new breakout rooms with small groups, giving everyone the chance to meet a diverse range of peers. Each breakout session will feature engaging prompts to spark conversations and make networking enjoyable and memorable! Who will attend this event? Executive Assistant (EA) Personal Assistant (PA) Virtual Assistant (VA) Legal Secretary Legal Executive Assistant Administrative Assistant Office Manager Health Care Office Manager Chief of Staff Additional roles may be relevant depending on role responsibilities, along with development opportunities. This workshop is open to females, male including trans women/males and non-binary professionals. Group Rate Discounts: To discuss our group rates in more detail, please email support@elite-forums.com and provide the following: Group Number (How many would like to attend) Event Date (If numerous dates, please advise if we are splitting attendees across multiple dates) Attendee Contact details (Or request our Group Rate Document. Complete and return - we'll sort the rest.) Group discounts are on request - see below group rate discount brackets: 🧩 You just need one piece to come together - to unlock your Elite Potential. 🔑

Elite EA PA Forum 🇳🇿
Delivered Online
$749 to $995

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Certified Artificial Intelligence Practitioner

By Mpi Learning - Professional Learning And Development Provider

This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.

Certified Artificial Intelligence Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£595
1...56789...88