• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1502 Opera courses in Wetherby delivered Live Online

Essential EVPN

5.0(3)

By Systems & Network Training

Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in Internationally or OnlineFlexible Dates
£2,477

Elite EA PA Forum 🇬🇧

By Elite Forums UK

Elite EA/PA Forum We are delighted to announce the Elite EA/PA Forum for the UK & Ireland will be on the 13th November 2025. Our workshop aims to: Enhance your influence and impact by mastering assertive communication, negotiation, and self-advocacy skills. Stay composed and solution-focused in high-pressure situations with practical tools for crisis management and clear decision-making. Embrace evolving technology by understanding how AI and automation can streamline your role and boost efficiency. Future-proof your career by building strategic value, resilience, and adaptability in an ever-changing professional landscape. Keynote Address with Q&A from the audience: What to expect from Sam's Keynote: With over 30 years supporting leaders at the highest levels, Sam Cohen brings a wealth of insight, experience, and stories (the kind she can share) to the stage. From 18 years serving within The Royal Household - including as Deputy Private Secretary and Press Secretary to Her late Majesty Queen Elizabeth II - to working with The Duke and Duchess of Sussex, running the Prime Minister’s Office at Downing Street, and serving as Chief of Staff to the global CEO of Rio Tinto, Sam’s career is a masterclass in discretion, diplomacy, and delivering at the top. In this exclusive keynote, Beyond the Role, Sam will explore how Executive Assistants don’t just support leaders - they shape leadership, drive strategy, and build legacy from behind the scenes. Join us for this rare opportunity to hear from someone who’s been at the epicentre of power - and bring your questions! The keynote will include a live Q&A, where you can ask Sam about her remarkable career, leadership insights, and how to truly excel in high-performance environments. (Don’t ask her what the Queen kept in her handbag - she’s not telling.) Sam Cohen Career Bio: Sam Cohen has spent the last 30 years working to support leaders in the public and private sectors. Sam spent 18 years serving The Royal Household, as Deputy Private Secretary to Her late Majesty Queen Elizabeth II and Press Secretary to The Queen. Sam also served as Private Secretary to The Duke and Duchess of Sussex. Following this time, Sam worked as Director of the Prime Minister’s Office at Downing Street under Boris Johnson and, most recently, was Chief of Staff to the global CEO at Rio Tinto. Source: ABC News - YouTube Channel. Facilitator - AM: Monika Turner The Confident Assistant - Speak Up, Go After What You Want & Create The Future You Deserve: Develop practical strategies to negotiate workload, boundaries, and career growth with confidence. Learn assertive communication techniques to handle challenging conversations effectively. Build self-advocacy skills to articulate your value and influence outcomes in the workplace. Monika Turner Career Bio: Monika Anna Turner is an ICF-certified Leadership and Executive coach with over seven years of experience helping professionals unlock their confidence, elevate their voice, and lead with authenticity. Before stepping into coaching, she built a successful career as a Personal Assistant, Executive Assistant, and ultimately Chief Of Staff —giving her a deep understanding of the unique challenges and strengths of support roles. Originally from Poland, Monika knows firsthand what it’s like to question your voice and your value—especially in a second language. Her journey from self-doubt to self-assurance informs everything she does today. Through her coaching, she empowers assistants and leaders alike to move beyond fear, speak up and create fulfilling careers they’re proud of. Panel Fabiana Goncalves Executive Assistant to Global VP PerfectDraft & PerfectDraft Commercial Director An accomplished C-Suite Executive & Personal Assistant, I bring over a decade of experience supporting top-level leadership—including CEOs, Founders, and Executive Teams—across multinational and national organizations. I specialize in executive support that goes far beyond calendar management, contributing as a strategic partner in decision-making, operations, and leadership effectiveness. Known for my discretion, diplomacy, and operational precision, I help executives stay focused on what matters most—by anticipating needs, managing complexity, and driving efficiency in both corporate and personal domains. I bring a strategic lens to every task, balancing immediate priorities with long-term objectives. With a proactive mindset, sharp judgment, and strong communication skills, I serve as a trusted advisor and problem-solver in fast-paced, high-stakes environments. Rebecca Polson Executive Support Manager to the Chief Executive An award-winning Executive Assistant with over 10 years’ experience across the higher education, charity, private, and public sectors. Currently Executive Support Manager to the Chief Executive at Alzheimer’s Research UK, she provides high-level support in the fast-paced, mission-driven environment of the largest dementia research charity in the UK. Her previous roles include supporting senior leaders at the Natural History Museum, the Incorporated Society of Musicians, and the Royal College of Music. She brings expertise in executive support, governance, stakeholder engagement, and complex diary and project management. Named PA of the Year in 2023 and a finalist in the SecsintheCity PA of the Year Awards, she is known for her professionalism, discretion, and ability to stay ahead of the needs of the people and organisations she supports. Ola Boddington Senior Executive Assistant As a seasoned Executive Assistant, she has honed her skills in management and project planning over the years. She has worked with various organisations, including Zoa, Signal AI, and ConsenSys, where she provided high-level administrative support to senior executives. Her expertise lies in managing complex schedules, coordinating travel arrangements, and ensuring seamless communication among team members. She is also proficient in using various software tools to streamline workflows and enhance productivity. She is passionate about delivering exceptional service and contributing to the success of the teams she works with. Claudine Martin Senior Executive Assistant Claudine is a highly skilled Senior Executive Assistant, currently supporting the Head of BNY Pershing EMEA. With a distinguished career spanning nearly 17 years in the British Army, Claudine retired in 2023 at the rank of Staff Sergeant, bringing a wealth of experience in high-pressure environments and strategic operations to her current role. Throughout her military career, Claudine specialised in Human Resources, and served as the Personal Assistant to the Army Director of Engagement and Communication at the Ministry of Defence. In this capacity, she played a pivotal role in the planning and execution of significant events and initiatives, showcasing her exceptional organisational skills and attention to detail. Her dedication and professionalism were recognised when she was awarded PA of the Year in 2019 by PA Life. An advocate for the Executive Assistant profession, Claudine is also a sought-after public speaker. She regularly shares her insights at industry events, including the PA Show, and serves as an advisory board member, contributing to the ongoing development and recognition of the profession. Claudine is passionate about empowering others and has previously mentored young people through the Diana Award, a programme established in honour of Princess Diana to support disadvantaged youth. Additionally, she has participated in Fast Forward 15, a mentoring initiative aimed at women aspiring to build careers in events, hospitality, or related industries. With her extensive experience, dedication to excellence, and commitment to mentorship, Claudine continues to make a significant impact in her field and inspire the next generation of leaders. She proudly represented the UK at the Invictus Games 2023, showcasing her unwavering determination and unwavering spirit. In her spare time, Claudine enjoys park run and writing poems. The Importance of Becoming a Strategic Advisor Learn how to shift from reactive to proactive. Develop the mindset and behaviours of a strategic advisor. Understand how to add value beyond your job description. Facilitator - PM: Justin Kabbani AI Is Not Here to Replace You. It's Here to Upgrade You. We'll explore Justin's proven 3P framework: Priming – How to set up AI like a strategic advisor by feeding it context, tone and mindset Prompting – How to craft clear, structured instructions to get consistently great results Producing – How to turn AI outputs into high-leverage work that makes you stand out Your session outcomes: Real examples from admin professionals already using AI to elevate their work Prompts you can copy, adapt, and test live Interactive exercises to build confidence fast A practical challenge to implement right after the session If you’ve been overwhelmed by AI, or underwhelmed by its impact, this session will change that. You'll leave with tools you can use today, and a mindset you’ll carry forward for the rest of your career. Justin Kabbani Career Bio: Justin Kabbani is one of Australia’s most in-demand AI trainers and keynote speakers, known for making AI feel simple, powerful, and immediately useful. He’s worked with brands like Uber, Treasury Wine Estates, and Udemy, helping their teams embed AI into daily workflows, strategic planning, and executive communication. Over the past two years, Justin has trained more than 2,000 professionals across Australia and beyond, consistently earning feedback like “mind-blowing,” and “game-changing”. His signature Prime, Prompt, Produce framework has transformed how business leaders, executive assistants, marketers, and teams think, work, and communicate with AI, without needing to be “tech people.” Justin believes AI isn’t here to replace people. It’s here to take the robotic work off our plate, so we can focus on what humans do best. LinkedIn: https://www.linkedin.com/in/justinkabbani/ Website: https://justinkabbani.com/ Speed Connections Networking Session Join us for Speed Connections, a lively 30-minute networking session designed to foster meaningful connections in a fun, fast-paced environment. Every 10 minutes, attendees will be placed into new breakout rooms with small groups, giving everyone the chance to meet a diverse range of peers. Each breakout session will feature engaging prompts to spark conversations and make networking enjoyable and memorable! Who will attend this event? Executive Assistant (EA) Personal Assistant (PA) Virtual Assistant (VA) Legal Secretary Legal Executive Assistant Administrative Assistant Office Manager Health Care Office Manager Chief of Staff Additional roles may be relevant depending on role responsibilities along with development opportunities. This workshop is open to females, male including trans women/males and non-binary professionals. Group Rate Discounts To discuss our group rates in more detail, please email support@elite-forums.com and provide the following: Group Number (How many would like to attend) Event Date (If numerous dates, please advise if we are splitting attendees across multiple dates) Attendee Contact details (Or request our Group Rate Document. Complete and return - we'll sort the rest.) Group discounts are on request - see below group rate discount brackets: 🧩 You just need one piece to come together - to unlock your Elite Potential. 🔑 Media outlets/organisations will not be permitted to attend this event.

Elite EA PA Forum 🇬🇧
Delivered Online
£345 to £495

Pumps, Compressors, Turbines & Troubleshooting

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This intermediate to advanced level 3 full-day training course has been designed to provide participants with a detailed and up-to-date overview of the fluid mechanic fundamentals and operating practice of pumps, compressors and gas and steam turbines. Upon the successful completion of this course, participants will have acquired the practical knowledge to enable them not only to choose the correct device for a particular application but also be in a position to resolve many commonly occurring operating problems. Troubleshooting is an important part of this course and will cover the important topics of Machinery Root Cause Failure Analysis (RCFA) together with Vibration Analysis. This course is ideal for those personnel in the oil, gas, petrochemical, chemical, power and other process industries who require a wider and deeper appreciation of pumps, compressors and turbines, including their design, performance and operation. The participants will be taken through an intensive primer of turbo-machinery principles, using the minimum of mathematics, and will learn how to solve the many and varied practical industrial problems that are encountered. The course makes use of an extensive collection of VIDEO material together with case studies and numerical exercises. Training Objectives Upon the successful completion of this course, each participant will be able to: Apply a comprehensive knowledge of pumps, compressors & turbines and troubleshoot rotating equipment in a professional manner Identify the different types of turbomachinery including basic design aspects and highlighted problem areas Minimise compressor work by understanding the processes involved and identifying their efficiency Understand the flow through turbomachines and the corresponding velocity triangles including torque and power calculations Analyse the different types of centrifugal machines including their design, installation, operation, maintenance, re-rate/retrofit, troubleshooting and control Recognise the various beneficial design aspects of turbomachines and understand the crucial process of cavitation Carry out proper methods of device installation, operation, maintenance and troubleshooting Understand and apply the powerful methods of Machinery Root Cause Failure Analysis Understand the various methods of vibration analysis applied to device diagnostics Target Audience This course provides an overview of all significant aspects and considerations of pumps, compressors and turbines for those who are involved in the design, selection, maintenance or troubleshooting of such equipment. This includes maintenance, reliability, integrity, engineering, production and operations managers, engineers and other technical staff. Course Level Intermediate Advanced Trainer Your expert course leader is a Senior Mechanical & Instrumentation Engineer (UK, B. Sc., M.Eng., Ph D) with over 45 years of industrial experience in Process Control & Instrumentation, Pumps, Compressors, Turbines and Control Valve Technology. He is currently a Senior Independent Consultant to various petrochemical industries in the UK, USA, Oman, Kuwait and KSA where he provides consultancy services on both the application and operational constraints of process equipment in the oil & gas industries. During his early career, he held key positions in Rolls Royce (UK) where he was involved in the design of turbine blading for jet engines, subject to pre-specified distributions of pressure. During this period and since, he has also been closely involved in various aspects of Turbomachinery, Thermodynamics and Fluid Mechanics where he has become a recognised authority in these areas. Later, he joined the academic staff of University of Liverpool in the UK as a Professor in Mechanical Engineering Courses. A substantial part of his work has been concerned with detailed aspects of Flowmetering - both of single & multiphase flows. He has supervised doctoral research students in this area in collaboration with various European flowmeter manufacturers. He joined Haward Technology Middle East in 2002 and was later appointed as European Manager (a post which has since lapsed) and has delivered over 150 training courses in Flowmeasurement (single- and multi-phase), Control, Heat Exchangers, Pumps, Turbines, Compressors, Valve and Valve Selection as well as other topics throughout the UK, USA, Oman and Kuwait. During the last two years, he has delivered courses with other training companies operating in the Far and Middle East. He has published about 150 papers in various Engineering Journals and International Conferences and has contributed to textbooks on the topics listed above. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Pumps, Compressors, Turbines & Troubleshooting
Delivered in Internationally or OnlineFlexible Dates
£2,665 to £3,099

Oracle SQL foundation

5.0(3)

By Systems & Network Training

Oracle SQL training course description The Oracle SQL course is designed to give delegates practical experience in writing SQL statements and scripts using Oracle SQL. The basic SELECT statement, the use of SQL functions and the basic table and view handling statements are introduced. What will you learn Create SQL statements to query database tables. Use standard aggregate functions and related SELECT statement clauses. Join Tables. Use basic subqueries and the set operators. Use numeric, character and date functions. Use conversion and other miscellaneous functions. Use SQL parameters. Use complex subqueries. Create and alter tables and views. Insert, update and delete rows in database tables. Manage sequences and synonyms. Oracle SQL training course details Who will benefit: Anyone who needs to use and understand Oracle SQL to query and update data in an Oracle database. Prerequisites: None. Duration 3 days Oracle SQL training course contents Retrieving data with the SELECT statement The SELECT statement, The SELECT and FROM clauses, Conditions and the WHERE clause, Other conditional operators, Logical operators, The ORDER BY clause, Column aliases, Arithmetic expressions, Precedence of operators. Aggregate functions Overview of built In aggregate functions, The GROUP BY clause, The HAVING clause. Joining tables Overview of table joins, Inner joins, Table aliases, Outer joins, Self joins, ANSI standard joins. Basic subqueries and set operators Overview of subqueries, Basic subqueries, Set operators, The union, intersect and ,minus operators. Numeric, character and data functions Function types, Using the table dual to try out functions, Numeric functions, Character functions, String concatenation, Date arithmetic and date functions. Conversion and miscellaneous functions Conversion functions, The NVL and NVL2 functions, The DECODE function, CASE expressions, The COALESCE and NULLIF functions. SQL parameters Command line substitution parameters, The accept command, The define and undefine commands. Complex subqueries Subqueries usage, In-line views, Top-N queries, Subqueries with joins, Multi column subqueries, Correlated subqueries, Subquery rules, Using the ANY, ALL and SOME operators. Managing data Inserting rows, Updating rows, Deleting rows, Verifying updates, Transaction control, Commit and rollback, Savepoints, Commits and constraints, Amending data in SQL developer. Managing tables Creating tables, Specifying constraints, Altering tables, columns and constraints, Dropping tables, columns and constraints, Recovering dropped tables, Copying tables. Managing indexes and views Creating indexes, Dropping indexes, Listing indexes, Creating and using views, Dropping views, Listing views. Managing sequences and synonyms Create a sequence, View sequence details, Create a synonym, List synonyms.

Oracle SQL foundation
Delivered in Internationally or OnlineFlexible Dates
£2,367

Process Control and Instrumentation

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This course will begin with a presentation of topics to familiarize Process and Instrumentation Engineers with procedures and practices involved in the choice of sensors related to the measurement of temperature, pressure, level and flow in relation to single-phase flows. It will provide guidance on the optimum commercially available devices through a detailed comparison of their relative merits. At the heart of this course is sensor calibration which is a crucial element for these topics. The course will also examine the various types of flow control valve, including Globe, Slide, Needle, Eccentric plug and Ball valves and their characteristics in industrial application, while focusing on the problems of Cavitation and Flashing and methods to minimise or eradicate these issues. With the use of examples, industry case studies and a wide range of videos, this course will also cover all aspects of proportional (P), derivative (D) and integral (I) control. In particular, it will address the advantages and disadvantages of PI and PID control. It will also describe Cascade, Feed forward, Split Range, Override and Ratio Control techniques. Training Objectives By attending this course, participants will acquire the following knowledge and skills: Apply an in-depth knowledge to the measurement of temperature, pressure, level and flow as well as to the fluid mechanics of pipe flows Assess the advantages and disadvantages of the major flowmeter types including the differential pressure, rotary positive displacement, rotary-inferential, electromagnetic, ultrasonic and Coriolis mass flowmeters to determine the optimum choice for a given application Make a considered judgement of the choice of fluid level measurement devices Understand the various types of flow calibration, metering systems and provers Carry out tank measurement and tank calibration methods and to calculate net sellable quantities Discuss valve characteristics & trim selection and illustrate the process of control valve sizing Explain the terms Open and Closed loop Define Process Variable, Measured Variable, Set Point and Error Define Direct and Reverse controller actions Explain the terms Process Lag, Measurement Lag, Transmission Lag, and Response Lag and their effect on controllability Explain ON/ OFF Control and the inherent disadvantages Explain Proportional Control, Offset, Gain and Proportional Band and the advantages and disadvantages of Proportional only control Explain the fundamentals and operation principles of Integral (I) Action and the disadvantages of proportional plus integral control Explain the fundamentals and operation principles of Derivative (D) Action in conjunction with P action Describe the operating principles of a PID Controller and explain the applications and advantages of PID control Describe Cascade, Forward, Split Range and Ratio Control operation principles Target Audience This course will benefit instrumentation, inspection, control, custody metering and process engineers and other technical staff. It is also suitable for piping engineers, pipelines engineers, mechanical engineers, operations engineers, maintenance engineers, plant/field supervisors and foremen and loss control coordinators. Trainer Your expert course leader is a Senior Mechanical & Instrumentation Engineer (UK, B. Sc., M.Eng., Ph D) with over 45 years of industrial experience in Process Control & Instrumentation, Pumps, Compressors, Turbines and Control Valve Technology. He is currently a Senior Independent Consultant to various petrochemical industries in the UK, USA, Oman, Kuwait and KSA where he provides consultancy services on both the application and operational constraints of process equipment in the oil & gas industries. During his early career, he held key positions in Rolls Royce (UK) where he was involved in the design of turbine blading for jet engines, subject to pre-specified distributions of pressure. During this period and since, he has also been closely involved in various aspects of Turbomachinery, Thermodynamics and Fluid Mechanics where he has become a recognised authority in these areas. Later, he joined the academic staff of University of Liverpool in the UK as a Professor in Mechanical Engineering Courses. A substantial part of his work has been concerned with detailed aspects of Flowmetering - both of single & multiphase flows. He has supervised doctoral research students in this area in collaboration with various European flowmeter manufacturers. He joined Haward Technology Middle East in 2002 and was later appointed as European Manager (a post which has since lapsed) and has delivered over 150 training courses in Flowmeasurement (single- and multi-phase), Control, Heat Exchangers, Pumps, Turbines, Compressors, Valve and Valve Selection as well as other topics throughout the UK, USA, Oman and Kuwait. During the last two years, he has delivered courses with other training companies operating in the Far and Middle East. He has published about 150 papers in various Engineering Journals and International Conferences and has contributed to textbooks on the topics listed above. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Process Control and Instrumentation
Delivered in Internationally or OnlineFlexible Dates
£2,665 to £3,099

Web Development with HTML5, CSS, and JavaScript

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for While no prior programming or web development experience is required, target students should have good foundational computer skills. Overview Set up the tools and resources you need to perform Web Development. Create web pages in HTML, constructing valid, well-formed elements, including navigation links, sections, titles, and semantic markup. Enhance HTML content with tables, images, movies, and audio. Apply styles to HTML elements using CSS. Use CSS to format the edges, size, position, and layering of HTML elements. Apply complex style rules using advanced CSS selectors, including pseudo-class selectors, structural selectors, and pseudo-element selectors. Create complex layouts using CSS newspaper style columns, grid layouts, and flexible box layouts. Improve the quality of web content, including adaptability (different displays and devices), searchability, usability, and accessibility. Submit data through URL query strings and web forms for processing by a web application server. Write JavaScript code to make web pages more interactive, perform data processing tasks directly in the browser, and manipulate items in the current web page. Write JavaScript code to iterate through collections of elements in a page to get and set their attributes and add event listener code. Use third-party libraries and frameworks for web front-end development. Modern organizations depend heavily on the web to perform core business operations such as marketing, advertising, and selling products, providing services, and communicating with customers, partner organizations, and employees. Whatever you're creating on the web, HTML, CSS, and JavaScript? likely play an important role. These three languages provide the core toolkit for anyone looking to perform web development work. This course covers the fundamentals of web development using these three languages. Prerequisites This course assumes that students have strong experience working with computers. Previous experience programming in other languages is helpful, but not required for students to benefit from this course. Lesson 1: Setting Up Your Web Development Environment Topic A: Prepare Your Web Platform Topic B: Prepare Your Web Development Tools and Processes Topic C: Monitor the Web Request-Response Cycle Lesson 2: Creating Web Content in HTML Topic A: Create a Basic Web Page Topic B: Provide Navigation Links Between Web Pages Topic C: Improve Web Page Structure and Navigation Lesson 3: Adding Tables and Multimedia Content to a Web Page Topic A: Create a Table Topic B: Embed Images, Movies, and Audio in a Web Page Lesson 4: Applying Styles to Web Content Topic A: Apply Styles to HTML Topic B: Create a Style Sheet Topic C: Use Web Fonts Lesson 5: Controlling Edges, Size, and Position Topic A: Format Element Edges and Corners Topic B: Control an Element's Height and Width Topic C: Control an Element's Position and Layering Topic D: Normalize and Reset Browser CSS Defaults Lesson 6: Applying Complex Style Rules Topic A: Use Advanced Selectors Topic B: Manage User Interface States Topic C: Make Structure Apparent to Users Topic D: Use CSS Pseudo-Element Selectors Lesson 7: Creating Complex Layouts Topic A: Use CSS to Create Newspaper Style Columns Topic B: Use CSS to Create Grid Layouts Topic C: Use CSS to Create Flexible Box Layouts Lesson 8: Improving Web Content Topic A: Adjust the Layout for a Wide Variety of Devices Topic B: Perform Basic Search Engine Optimization Topic C: Test Your Website Lesson 9: Submitting Data to a Web Server for Processing Topic A: Submit Data Through a URL Topic B: Submit Data Through a Web Form Lesson 10: Writing JavaScript Code Topic A: Add JavaScript to a Web Page Topic B: Perform Operations on Data Topic C: Program Repetitive Tasks Topic D: Manipulate DOM Objects Lesson 11: Enumerating and Processing Collections of Elements Topic A: Enumerate Elements Topic B: Attach Events Through Code Lesson 12: Using Third-Party Libraries and Frameworks Topic A: Use a Third-Party JavaScript Library Topic B: Create a Web Page Based on a Third-Party Framework Additional course details: Nexus Humans Web Development with HTML5, CSS, and JavaScript (v1.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Web Development with HTML5, CSS, and JavaScript (v1.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Web Development with HTML5, CSS, and JavaScript
Delivered OnlineFlexible Dates
£2,380

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Best Practices Procurement for Carbon Offsets in the Energy Industry

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course More energy companies today are setting ambitious net-zero targets and are expected to pour billions into the voluntary carbon offset market by the end of this decade. To get to net zero emissions, companies will need to balance emissions with nature and technology-based offsets. Markets are the best tool for connecting carbon sources and sinks. Many countries will not have enough supply inside their borders and will need to co-operate with those who have extra greenhouse gas removal potential. The energy industry is in search of effective climate tools as pressure mounts from investors and consumers for more progress on fighting rising emissions. Corporations fighting to cut their carbon footprint have for years focused on internal reduction measures. Many are now adding to that effort by turning to carbon credits, a process made easier as verification and registration tools mature. One particular category of carbon offsets leads the way: high-quality, nature-based carbon credits. These represent the largest category of carbon credit projects in the voluntary carbon market, comprising nearly half of credits issued. Public concern about this practice focused on the additionality, leakage, and integrity of carbon offsets that are created through reforestation, land preservation, carbon capture and other projects. Lack of standardization and government regulation has also increased uncertainty for all participants in carbon markets, creating risks for developers of credit-generating projects and offset purchasers. Demand for higher-quality offsets will value projects that were subjected to due diligence and rely upon reputable third-party verification. Companies purchasing offsets generated by permanent and quantifiable projects will therefore be in the best position moving forward. In this highly interactive training course, your course instructor will guide you through the latest developments and best procurement practices to successfully operate in the voluntary carbon market. Training Objectives At the end of this course, the participants will be able to: Discover the current state of the carbon economy Gain insights into the voluntary carbon market Learn about the different type carbon credits available Examine how companies can reach net zero target by using carbon offsets Uncover best practices in carbon credit procurement strategy Learn the pricing dynamics carbon credits Examine how to identify and ensure high quality credits Obtain key learning from flawed carbon offset projects Target Audience This course is intended for: Energy transition team leaders Carbon credit procurement professionals ESG strategy team leaders Finance and accounting professionals Low carbon business analysts or economists Corporate business sustainability professionals Legal, compliance and regulatory professionals Carbon trading professionals Course Level Intermediate Trainer Your expert course leader is a skilled and accomplished professional with over 25 years of extensive C-level experience in the energy markets worldwide. He has a strong expertise in all the aspects of (energy) commodity markets, international sales, marketing of services, derivatives trading, staff training and risk management within dynamic and high-pressure environments. He received a Master's degree in Law from the University of Utrecht in 1987. He started his career at the NLKKAS, the Clearing House of the Commodity Futures Exchange in Amsterdam. After working for the NLKKAS for five years, he was appointed as Member of the Management Board of the Agricultural Futures Exchange (ATA) in Amsterdam at the age of 31. While working for the Clearing House and exchange, he became an expert in all the aspects of trading and risk management of commodities. In 1997, he founded his own specialist-consulting firm that provides strategic advice about (energy) commodity markets, trading and risk management. He has advised government agencies such as the European Commission, investment banks, major utilities and commodity trading companies and various energy exchanges and market places in Europe, CEE countries, North America and Asia. Some of the issues he has advised on are the development and implementation of a Risk Management Framework, investment strategies, trading and hedging strategies, initiation of Power Exchanges (APX) and other trading platforms, the set-up of (OTC) Clearing facilities, and feasibility and market studies like for the Oil, LNG and the Carbon Market. The latest additions are (Corporate) PPAs and Artificial Intelligence for energy firms. He has given numerous seminars, workshops and (in-house) training sessions about both the physical and financial trading and risk management of commodity and carbon products. The courses have been given to companies all over the world, in countries like Japan, Singapore, Thailand, United Kingdom, Germany, Poland, Slovenia, Czech Republic, Malaysia, China, India, Belgium and the Netherlands. He has published several articles in specialist magazines such as Commodities Now and Energy Risk and he is the co-author of a book called A Guide to Emissions Trading: Risk Management and Business Implications published by Risk Books in 2004. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Best Practices Procurement for Carbon Offsets in the Energy Industry
Delivered in Internationally or OnlineFlexible Dates
£2,751 to £3,199

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues Lesson 10: Configuring Windows Topic 10A: Configure Windows User Settings Topic 10B: Configure Windows System Settings Lesson 11: Managing Windows Topic 11A: Use Management Consoles Topic 11B: Use Performance and Troubleshooting Tools Topic 11C: Use Command-line Tools Lesson 12: Identifying OS Types and Features Topic 12A: Explain OS Types Topic 12B: Compare Windows Editions Lesson 13: Supporting Windows Topic 13A: Perform OS Installations and Upgrades Topic 13B: Install and Configure Applications Topic 13C: Troubleshoot Windows OS Problems Lesson 14: Managing Windows Networking Topic 14A: Manage Windows Networking Topic 14B: Troubleshoot Windows Networking Topic 14C: Configure Windows Security Settings Topic 14D: Manage Windows Shares Lesson 15: Managing Linux and macOS Topic 15A: Identify Features of Linux Topic 15B: Identify Features of macOS Lesson 16: Configuring SOHO Network Security Topic 16A: Explain Attacks, Threats, and Vulnerabilities Topic 16B: Compare Wireless Security Protocols Topic 16C: Configure SOHO Router Security Topic 16D: Summarize Security Measures Lesson 17: Managing Security Settings Topic 17A: Configure Workstation Security Topic 17B: Configure Browser Security Topic 17C: Troubleshoot Workstation Security Issues Lesson 18: Supporting Mobile Software Topic 18A: Configure Mobile OS Security Topic 18B: Troubleshoot Mobile OS and App Software Topic 18C: Troubleshoot Mobile OS and App Security Lesson 19: Using Support and Scripting Tools Topic 19A: Use Remote Access Technologies Topic 19B: Implement Backup and Recovery Topic 19C: Explain Data Handling Best Practices Topic 19D: Identify Basics of Scripting Lesson 20: Implementing Operational Procedures Topic 20A: Implement Best Practice Documentation Topic 20B: Use Proper Communication Techniques Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered OnlineFlexible Dates
£2,475