• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17130 Other courses in Killamarsh delivered Online

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Emotional Intelligence

By Underscore Group

Understand what Emotional Intelligence is and how it impacts you and others around you. Course overview Duration: 1 day (6.5 hours) Emotional intelligence (EI) is increasingly being regarded as a major key to personal success. IQ measures our ability to problem solve and is pretty difficult if not impossible to change. Our emotional intelligence is our ability to problem solve about emotions and like any other skill can be developed and honed. Some of the most successful people in life today are those who are regarded as having a high level of emotional intelligence whatever their level of IQ. Being able to manage themselves and others successfully is often a crucial factor in their success. With a growing emphasis on ‘soft skills’, leaders and managers need to be able to sensitively handle other people, both within and outside the organisation. Emotions are important in work life. They drive motivation and commitment; they are an inherent part of what we do whatever our job role. Effective individuals are proficient at recognising, using, understanding, and managing emotions in themselves and others. This one day course will help participants improve their understanding and skill in these areas. Objectives  By the end of the course you will be able to: Identify the aspects of your role where emotions are important Recognise the four key elements of Emotional Intelligence Use a range of skills to build and maintain key relationships Develop an emotionally intelligent ‘culture’ in your part of the organisation Create a personal action plan to continue to enhance and monitor your Emotional Intelligence Content Emotional Intelligence (EI) What is Emotional Intelligence? Where does it sit in the “whole person model” IQ, Personality Traits, Skills and Knowledge and EI Dispelling the myths and legends about EI The RUUM Model of EI Recognising emotions in self and others Using emotions Understanding emotions Managing emotions Developing Skills in each of the 4 areas of EI Short and long-term strategies to develop EI Developing compensating strategies where needed Practical application of EI Leveraging EI strengths Practice using RUUM Model Case studies and scenarios Video analysis Examples in the public eye we can all relate to Incorporating EI into your day to day role Practical steps Peer coaching Action planning Optional Follow-up After completing this course, you have an opportunity to complete a psychometric to understand more about emotional motional drivers and derailers. If you would like to do this, you will be invited to complete a psychometric questionnaire called Lumina Emotion.It can be done online and takes between 30-60 minutes. The results are compiled into a report which one of our trained and accredited coaches will go through with the participant individually to work up an action plan to leverage their EI strengths and develop strength where needed.This can be very powerful in building EI into your people and your organisation.

Emotional Intelligence
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Diploma in Aromatherapy at QLS Level 5

4.8(9)

By Skill Up

Level 5 QLS Endorsed Diploma | 150 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

Diploma in Aromatherapy at QLS Level 5
Delivered Online On Demand14 days
£109

Diploma in Counselling and Psychology at QLS Level 5

4.8(9)

By Skill Up

Level 5 QLS Endorsed Diploma | 150 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

Diploma in Counselling and Psychology at QLS Level 5
Delivered Online On Demand14 days
£109

VMware Kubernetes Fundamentals and Cluster Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview

VMware Kubernetes Fundamentals and Cluster Operations
Delivered OnlineFlexible Dates
Price on Enquiry

Python Introduction

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is aimed at students new to the language who may or may not have experience with other programming languages. Overview Learn how Python works and what it's good for. Understand Python's place in the world of programming languages Learn to work with and manipulate strings in Python. Learn to perform math operations with Python. Learn to work with Python sequences: lists, arrays, dictionaries, and sets. Learn to collect user input and output results. Learn flow control processing in Python. Learn to write to and read from files using Python. Learn to write functions in Python. Learn to handle exceptions in Python. Learn to work with dates and times in Python. In this Python training course by Webucator, Inc, students learn to program in Python. Python Basics Running Python Hello, World! Literals Python Comments Data Types Variables Writing a Python Module print() Function Named Arguments Collecting User Input Getting Help Functions and Modules Defining Functions Variable Scope Global Variables Function Parameters Returning Values Importing Modules Math Arithmetic Operators Modulus and Floor Division Assignment Operators Built-in Math Functions The math Module The random Module Seeding Python Strings Quotation Marks and Special Characters String Indexing Slicing Strings Concatenation and Repetition Common String Methods String Formatting Built-in String Functions Iterables: Sequences, Dictionaries, and Sets Definitions Sequences Unpacking Sequences Dictionaries The len() Function Sets *args and **kwargs Flow Control Conditional Statements The is and is not Operators Python's Ternary Operator Loops in Python The enumerate() Function Generators List Comprehensions File Processing Opening Files The os and os.path Modules Exception Handling Wildcard except Clauses Getting Information on Exceptions The else Clause The finally Clause Using Exceptions for Flow Control Exception Hierarchy Dates and Times Understanding Time The time Module The datetime Module Running Python Scripts from the Command Line The sys Module sys.argv

Python Introduction
Delivered OnlineFlexible Dates
Price on Enquiry

Personalised Jewellery Design (Blender)

By FluidDesigner

Students will learn how easy it is to use 3D design software (Blender) to create personalised jewellery using Parametric Smart Objects

Personalised Jewellery Design (Blender)
Delivered Online On Demand1 hour
FREE

VC inside out

By VC Inside Out

VC funding, tech startups, tech valuation, valuation, fund raising, pitch deck, investor data room, cash flow and modeling, VC interviews, how to break into VC, VC funding, angel funding

VC inside out
Delivered OnlineFlexible Dates
£50 to £80

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

OneNote Magic

By IT's Easy Training

Creating a compelling social media hook for your OneNote online course can significantly boost your visibility and attract more learners. Start by crafting a message that highlights the unique benefits of your course, such as its convenience, comprehensive content, and interactive features. Use engaging visuals and testimonials to showcase the value of your course. Leverage the power of storytelling to connect with your audience on an emotional level, making the learning experience relatable and desirable. Tailor your message to fit the platform you're using; for instance, a short and catchy hook for Twitter, a visually appealing post for Instagram, or a detailed and informative article for LinkedIn. Remember to include a clear call-to-action, encouraging potential students to sign up or learn more. By combining these elements, you can create a social media hook that resonates with your target audience and sets your OneNote course apart from the competition.

OneNote Magic
Delivered Online On Demand2 hours 30 minutes
£9.99