Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who want to learn basic Word 2021 skills, such as creating, editing, and formatting documents; inserting simple tables and creating lists; and employing a variety of techniques for improving the appearance and accuracy of document content. Overview In this course, you will learn fundamental Word skills. You will: Navigate and perform common tasks in Word, such as opening, viewing, editing, saving, and printing documents, and configuring the application. Format text and paragraphs. Perform repetitive operations efficiently using tools such as Find and Replace, Format Painter, and Styles. Enhance lists by sorting, renumbering, and customizing list styles. Create and format tables. Insert graphic objects into a document, including symbols, special characters, illustrations, pictures, and clip art. Format the overall appearance of a page through page borders and colors, watermarks, headers and footers, and page layout. Use Word features to help identify and correct problems with spelling, grammar, readability, and accessibility. These days, most people take electronic word processing for granted. While we may still write out our grocery lists with pen and paper, we expect to use a computer to create the majority of our documents. It's impossible to avoid word-processing software in many areas of the business world. Managers, lawyers, clerks, reporters, and editors rely on this software to do their jobs. Whether you are an executive secretary or a website designer, you'll need to know the ins and outs of electronic word processing. Microsoft© Word 2021 is designed to help you move smoothly through the task of creating professional-looking documents. Its rich features and powerful tools can make your work easy, and even fun. In this course, you'll learn how to use Word 2021 to create and edit simple documents; format documents; add tables and lists; add design elements and layout options; and proof documents. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Word Associate (Office 365 and Office 2021): Exam MO-100 and Word Expert (Office 365 and Office 2021): Exam MO-101 certifications. Getting Started with Word 2021 Topic A: Navigate in Microsoft Word Topic B: Create and Save Word Documents Topic C: Manage Your Workspace Topic D: Edit Documents Topic E: Preview and Print Documents Topic F: Customize the Word Environment Formatting Text and Paragraphs Topic A: Apply Character Formatting Topic B: Control Paragraph Layout Topic C: Align Text Using Tabs Topic D: Display Text in Bulleted or Numbered Lists Topic E: Apply Borders and Shading Working More Efficiently Topic A: Make Repetitive Edits Topic B: Apply Repetitive Formatting Topic C: Use Styles to Streamline Repetitive Formatting Tasks Managing Lists Topic A: Sort a List Topic B: Format a List Adding Tables Topic A: Insert a Table Topic B: Modify a Table Topic C: Format a Table Topic D: Convert Text to a Table Inserting Graphic Objects Topic A: Insert Symbols and Special Characters Topic B: Add Images to a Document Controlling Page Appearance Topic A: Apply a Page Border and Color Topic B: Add Headers and Footers Topic C: Control Page Layout Topic D: Add a Watermark Preparing to Publish a Document Topic A: Check Spelling, Grammar, and Readability Topic B: Use Research Tools Topic C: Check Accessibility Topic D: Save a Document to Other Formats
Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention
Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks
In this course you’re invited to challenge limiting beliefs around ageing and to work towards clarity of life-purpose. In each session we show a series of short videos from experienced elders that are at the core of The Power in Ageing. After each video, an expert facilitator will invite you to reflect and explore your own responses to the key issues raised. You can then share (if you wish) or actively listen to others in a small facilitated group. There are also some optional activities that are engaging or fun. By bringing your own life experience and wisdom, you explore how you can enjoy each day in the present and live a fulfilled life in the future. In past courses, participants have found this revolutionary approach to ageing to be both beneficial and enjoyable. This is a safe programme that is tried and tested and is designed for people in their forties through to their seventies and above. It’s for people of all faiths or of no faith. There will be a couple of 5 minute break in each session so you can stay fresh and focused on the programme. We provide some Power of Ageing reading material after each session to help you get the most out of the course. (optional) We also offer an optional one-to-one follow up call after the course has finished. £45 for all 3 sessions "It's hugely important for me as an older man to re-engage with my peers, and with this time of life, positively. Life-stage offers me a creative, safe and beneficial way to do that." DAVID PUGSLEY "I attended the power of ageing course and was amazed to learn the different paths the attendees had taken to reach our age, how we'd all coped with the hurdles life had put in front of us. Each session the time just flew by because the topics were so interesting." JENNY KIRTON
Improve your riding and gain world-class qualifications as a snowboard instructor. With 4 - 11 week training options, you can ride for a month or a whole season.
Diploma in Anatomy and Physiology of Human Body Course Overview The Diploma in Anatomy and Physiology of the Human Body offers a comprehensive exploration of the structure and functions of the human body. It covers key systems, from the cellular level to complex bodily functions, providing a strong foundation in understanding human biology. Learners will gain valuable insights into the mechanisms that govern health and disease, which is essential for careers in healthcare, fitness, and other related fields. By the end of the course, learners will have a deep understanding of human anatomy and physiology, empowering them to apply this knowledge in various professional settings. Course Description This course covers a wide range of topics, including cellular chemistry, tissues, the skeletal and muscular systems, the nervous system, and the cardiovascular and reproductive systems. Learners will explore the intricate workings of the human body, including the mechanisms of cell division, metabolism, and sensory systems. The course provides detailed insights into the human brain, eyes, ears, digestive, and respiratory systems, as well as blood, lymphatics, and immunity. It offers a structured learning experience that develops learners' knowledge of human physiology and equips them with a thorough understanding of how the body functions in health and disease. The course is designed to prepare learners for roles that require a detailed understanding of human biology and the ability to apply it in diverse settings. Diploma in Anatomy and Physiology of Human Body Curriculum Module 01: The Chemistry of Cells Module 02: Cells Module 03: Cell Division Module 04: Replication and Metabolism Module 05: Human Tissues Module 06: Skin Module 07: Human Skeletal System Module 08: The Muscular System Module 09: Skeletal Muscle Fibre Module 10: Nervous System Module 11: The Brain Module 12: Nervous System—Spinal Cord and Spinal Nerves Module 13: Nervous System - Autonomic Nervous System and Cranial Nerves Module 14: Nervous System—The Eyes Module 15: Nervous System—The Ears, Hearing, and Equilibrium Module 16: Nervous System—Memory Module 17: Sensory Systems Module 18: Cardiovascular System Module 19: Blood Module 20: Lymphatics Module 21: Immune System Module 22: Digestive System Module 23: Respiratory System Module 24: Urinary System Module 25: Male Reproductive System Module 26: Female Reproductive System (See full curriculum) Who is this course for? Individuals seeking to understand the fundamentals of human biology. Professionals aiming to enhance their knowledge of anatomy and physiology. Beginners with an interest in healthcare, fitness, or biological sciences. Healthcare workers wishing to improve their understanding of the human body. Career Path Healthcare Assistant Fitness Trainer Medical Researcher Nurse Physiotherapist Biomedical Scientist Occupational Therapist Sports Therapist
Negotiation is an everyday challenge for some whether it be in the office, field or at home. Have you ever walked away from a situation thinking "if I'd only put my thoughts, side, opinion or words across better"? This 2-day course is perfect for managers, supervisors and sales people. It will focus on negotiation skills and the techniques that go with it. In this energy-charged provision you'll learn and practice negotiation, assertiveness and influencing techniques. Course Syllabus The syllabus of the Effective Communication and Influencing course is comprised of seven modules, covering the following: Module One An Introduction to Negotiation Assessment of your current sales and negotiation strengths and improvement areas What is negotiation? Identifying objectives and all factors affecting negotiation The negotiation model - the four stages Module Two The Preparation Stage The significance of preparation and why we need to prepare What do you need to prepare? Preparing a set of objectives: yours and theirs Understanding constants and variables Researching the other party Creating a "win-win" situation Preparing yourself for possible set-backs and objections Module Three The Discussion Stage The importance of rapport building Opening the negotiation The power of effective questioning techniques Improving your listening skills Controlling emotions Spotting the signs - non-verbal communication and voice clues Module Four The Proposing Stage Stating your opening position Responding to offers How to deal effectively with adjournments Module Five The Bargaining and Closing Stage Making concessions - the techniques Adopting key bargaining skills Dealing with objections and underhand tactics Closing techniques Confirming the agreement Creating long term, lasting commitment Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.
A Warm Welcome to Ludo Tutors Founded in 2017 by Martha, a Dyslexic and Dyspraxia graduate from Cambridge University (Education with English and Drama, BA MA Cantab), Ludo Tutors was created to provide students with a holistic, well-rounded education and excellent quality Tutors. We have over 150 Tutors on our books and tutor everything from Academic subjects (such as 11+ Exams, Key Stage Three Science, GCSEs and A Levels) through to LAMDA Drama, Shakespeare and Public Speaking Exams). What are 11+ / Entrance Exams? 11+ Exams, sometimes called 'Entrance Exams', are examinations that many UK private schools. The rare usually competitive and a bit daunting! Don't panic, though - we're here to help! How do I take Entrance Exams? Different schools have different application procedures, timelines and expectations. Some will belong to a body of schools using the same examination papers, whereas others will set their own, independent exams. Many also charge an administration fee. We do not advise parents on the applications themselves, but we have garnered a depth of knowledge about 11+ Exams that enable our Tutors to workeffikiently and effectively, whilst still keeping their students engaged and in good spirits. Who are your Tutors? Over half of our Tutors studied at either Oxford or Cambridge University and many hold PGCEs or TEFL/CELTA qualifications. All Tutors are Enhanced DBS checked. We interview each Tutor personally, to get to know them and to find our students the best match. What 11+ experience do you have? Our Founder, Martha, has extensive experience preparing students for the UK's top independent school exams, with many of her students achieving their first choice school, if not also a scholarship - lovely! This work is now carried out by our experienced and friendly tutors, with input from Martha if, as and when they may need extra support.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface