LOOKING FOR: ADULT FICTION, YA THRILLER Saskia Leach is an Agent's Assistant at Kate Nash Literary Agency and is currently training to become a Junior Agent. She graduated from Royal Holloway, University of London in 2020 with a BA degree in English and History, before joining Kate Nash Literary Agency in 2021. Saskia loves commercial fiction that features complex and dynamic characters and is fascinated by stories containing document inserts or written from multiple perspectives. Saskia enjoys commercial and book club fiction and is particularly looking for cosy crime from any period (whether contemporary like Janice Hallett and Richard Osman, traditional Golden Age murder mystery or historical), WW2 historical fiction in the vein of Heather Morris or Markus Zusak, twisty psychological thriller with a unique hook, LGBTQ+ romance, underrepresented voices and perspectives, YA thriller or romance, and locked-room thriller. Saskia would like you to submit a covering letter, 1 page synopsis and the first 2,500 words of your manuscript in a single word document. (In addition to the paid sessions, Saskia is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice given in your Agent121. The submission deadline is: Friday 22 November 2024
Welcome to Print Production: Professional Training for Printing Jobs. In this course, you'll learn: Fundamentals of Print Production:Introduction to the printing industryHistorical perspective and evolution of printOverview of print technologies and methods Process of Print Production:Step-by-step breakdown of the print production workflowUnderstanding pre-press, press, and post-press processesTroubleshooting common issues in the production pipeline Tools of Print Production:In-depth exploration of industry-standard softwarePractical use of design and layout toolsOverview of hardware and machinery used in print production Understanding Colour:Color theory and its application in printColor spaces, models, and calibrationTechniques for achieving accurate and consistent color reproduction Binding and Finishing:Various binding methods and their applicationsFinishing techniques for different print materialsQuality control in binding and finishing processes Preparing Raster Images:Best practices for working with raster imagesImage resolution, color modes, and file formatsHands-on exercises for image optimization in print projects Understanding Fonts:Typography essentials for printFont selection and pairingHandling fonts in various design software Photoshop Production Tips:Advanced techniques for image manipulation and enhancementOptimizing images for printIntegration of Photoshop into the print production workflow Illustrator Production Tips:Vector graphics essentialsCreating print-ready illustrations and designsLeveraging Illustrator tools for efficient print production
LOOKING FOR: ADULT FICTION Kate Barker has worked in publishing for over twenty years as an agent, commissioning editor and ghostwriter. Before setting up her own company, Kate Barker Literary Agency, she spent ten years at Penguin, where she was an Editorial Director for Viking, acquiring fiction and non-fiction. She has also worked for Orion, Curtis Brown and for digital publisher Bookouture. She is looking for commercial and reading group fiction for adults and would love to find an unputdownable thriller like Rosamund Lupton's Three Hours, a funny, heartbreaking contemporary novel like Queenie by Candice Carty-Williams or a romantic comedy with a unique premise like The Flatshare by Beth O'Leary. She also loves historical fiction and series crime. Kate would like you to submit a covering letter, one page synopsis and the first three chapters (Max 5,000 words) of your completed manuscript in a single word document. (In addition to the paid sessions, Kate is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 21 November 2024
Duration 1 Days 6 CPD hours This course is intended for To ensure success, students will need to be familiar with using personal computers and should have experience using a keyboard and mouse. Students should also be comfortable working in the Windows environment and be able to manage information on their computers. Overview Upon successful completion of this course, you will be able to create and develop Excel worksheets and workbooks in order to work with and analyse the data that is critical to the success of your organisation. This course is intended for those who wish to gain the foundational understanding of Excel that is necessary to create and work with electronic spreadsheets. Excel can help you organise, calculate, analyse, revise, update, and present your data. Getting Started with Excel Navigate the Excel User Interface Use Excel Commands Create and Save a Basic Workbook Enter and Edit Cell Data Fill Cells with Series of Data (AutoFill and Flash Fill) Use Excel Help Performing Calculations Create Worksheet Formulas Insert Functions and use Autocomplete Reuse Formulas and Functions Create an Absolute Reference Modifying a Worksheet Insert, Delete, and Adjust Cells, Columns, and Rows Move and Copy Data between Cells Search for and Replace Data Use Spellcheck and Proofing Formatting a Worksheet Apply Text Formats Apply Number Formats Align Cell Contents Apply and Copy Cell Styles Apply Basic Conditional Formatting Printing Workbooks Preview and Print a Workbook Controlling Page Layout Adding Headers and Footers Set Print Titles and Print Ranges Managing Workbooks Manage Worksheets Insert and Delete Worksheets Manage Workbook and Worksheet Views Manage Workbook Properties
LOOKING FOR: ADULT FICTION, NON-FICTION Imogen Pelham has been at Marjacq since 2015, and has worked as a literary agent for more than a decade. She represents literary fiction and some upmarket commercial fiction, as well as a wide range of non-fiction. Imogen's looking for fiction with a strong premise, a surprise twist, or sharp humour. Recent favourites include Leave The World Behind by Rumaan Alam, Early Morning Riser by Katherine Heiny, and Sorrow & Bliss by Meg Mason. Her non-fiction list includes history, memoir, medicine and psychology. She is particularly interested in identity, the arts and investigative journalism. Imogen would like you to submit a covering letter, 1 - 2 page synopsis and the first 10,000 words of your manuscript in a single word document. (In addition to the paid sessions, Imogen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 21 November 2024
Delve into the mesmerising world of print through 'Mastering the Role of a Printing Worker: From Setup to Final Print'. This comprehensive course demystifies the core components of print production, taking you on a journey from the basic principles to intricate techniques. From grasping colour theory to exploring industry-standard software tools like Photoshop and Illustrator, each module has been meticulously designed to equip you with the knowledge to produce exceptional print outcomes. As the print industry continually evolves, this course ensures you are at the forefront, armed with the most up-to-date skills. Learning Outcomes of Mastering the Role of a Printing Worker: From Setup to Final Print course Understand the essential steps and processes involved in print production. Identify and utilise the right tools crucial for producing high-quality prints. Gain a deep knowledge of colour theory and its application in print. Acquire expertise in preparing raster images and the nuances of fonts in printing. Master software-specific techniques for optimal results in both Photoshop and Illustrator. Why buy this Mastering the Role of a Printing Worker: From Setup to Final Print? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Mastering the Role of a Printing Worker: From Setup to Final Print there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Mastering the Role of a Printing Worker: From Setup to Final Print course for? This Mastering the Role of a Printing Worker: From Setup to Final Print does not require you to have any prior qualifications or experience. You can just enrol and start learning. Individuals passionate about venturing into the printing industry. Graphic designers keen to extend their skill set into print production. Entrepreneurs aiming to set up their own print production unit. Art and design students looking to gain a competitive edge in the print world. Traditional printers seeking to update their knowledge with modern techniques. Prerequisites of Mastering the Role of a Printing Worker: From Setup to Final Print course This Mastering the Role of a Printing Worker: From Setup to Final Print does not require you to have any prior qualifications or experience. You can just enrol and start learning. This Mastering the Role of a Printing Worker: From Setup to Final Print was made by professionals, and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Printing Technician: Average salary £24,000-£29,000 annually. Print Production Manager: Average salary £30,000-£40,000 annually. Graphic Designer (Print Specialisation): Average salary £25,000-£35,000 annually. Bindery Operator: Average salary £20,000-£26,000 annually. Colour Management Specialist: Average salary £28,000-£35,000 annually. Desktop Publisher: Average salary £23,000-£28,000 annually Course Curriculum Module 01: Fundamentals of Print Production Fundamentals of Print Production 00:13:00 Module 02: Process of Print Production Process of Print Production 00:17:00 Module 03: Tools of Print Production Tools of Print Production 00:16:00 Module 04: Understanding Colour Understanding Colour 00:15:00 Module 05: Binding and Finishing Binding and Finishing 00:11:00 Module 06: Preparing Raster Images Preparing Raster Images 00:15:00 Module 07: Understanding Fonts Understanding Fonts 00:12:00 Module 08: Photoshop Production Tips Photoshop Production Tips 00:14:00 Module 09: Illustrator Production Tips Illustrator Production Tips 00:13:00
LOOKING FOR: PICTURE BOOKS, CHAPTER BOOKS, MG, YA Lil is an editor with over 15 years experience in the publishing industry. She’s currently freelancing and is in direct contact with many of the big publishing houses: Hachette, Bonnier Books, and book packager, Working Partners Ltd, among others. She also works with the Caroline Wakeman Literary Agency, assessing their authors’ work for commercial viability, as well as scouting for new talent. For twelve years, Lil was a Senior Commissioning Editor at Working Partners Ltd – the creatives behind massive commercial hits such as Beast Quest, Warriors and the Daisy Meadows series. There she created globally successful concepts for every age group and developed storylines so the books were unputdownable. Lil is also an author in her own right: she has written 6 books under her own name, and ghost written many others under various pseudonyms. In every age level, Lil would like to see originality - particularly in voice. A strong character with depth, venturing on a quest that's never been undertaken before will get her excited. The 'quest' doesn't have to be epic in scale, it could be as small as petting the next-door neighbour's dog, or getting the good looking new kid to notice you, it just has to be something a reader will want to invest in. She also loves humour and is happy to see anything quirky (perhaps even downright silly!). For picture books, Lil would like you to submit a covering letter, and 1 complete manuscript, double-spaced, with spreads marked out, in a single word or PDF doc. For chapter books, MG and YA, please send a covering letter, the first three chapters and a synopsis, double spaced, in a single Word or PDF doc. Please send EITHER picture books OR another genre, not both in one submission. By booking this session you agree to email your material to reach I Am In Print by the stated submission deadline to agent121@iaminprint.co.uk. Please note that I Am In Print take no responsibility for the advice given in your Agent121. The submission deadline is: Monday 25 November 2024
LOOKING FOR: MG, YA, ADULT FICTION, ADULT NON-FICTION, NON-FICTION FOR 7+ Megan Carroll is looking for writers in a variety of areas, and from a wide range of backgrounds – she is particularly keen to hear from Black, Asian, and LGBTQIA+ writers. Her main areas of focus this year are adult fiction and non-fiction, as well as non-fiction for 7+, and MG and YA fiction. In Fiction, Megan is keen to see high-concept love stories (think The Flat Share or The Lock In) for both commercial and reading group readers. She’d love to see those familiar romance tropes – enemies to lovers, friends to lovers, love triangles, forbidden love etc. – with underrepresented characters at the centre. She is also looking for historical fiction and gothic horror (think Laura Purcell, Stacey Halls and Silvia Moreno-Garcia) – anything that has a creepy, uneasy undertone is likely for Megan’s list. Megan is also actively looking for upmarket fiction and would love to see layered family drama, contemporary stories about life today and darkly comic novels that explore a specific time, place or experience. In Non-Fiction, Megan is keen to hear from experts in their field talking about topics relating to film, music, true crime, popular culture, history and issues from largely unrepresented perspectives. She is keen to see memoir, narrative non-fiction and essay collections. In Children’s and YA, she is keen to see contemporary YA with humour, and romance at the heart – fun and emotional stories that appeal to the interests and issues of the teenage readers. She’d also love to see thrillers and horror stories for this age group too. It’s unlikely that high fantasy novels for YA readers will be right for her, but she is keen to see stories with fantasy elements in a real world setting. On the younger end, Megan is looking for funny, contemporary middle grade – think Louise Rennison and Karen McCombie – and anything creepy and spooky for 8-12 year old readers too. She’d love to find something like Lemony Snicket’s A Series of Unfortunate Events and is keen to find original adventure stories in both fantasy and realistic settings. Megan would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Megan is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 25 November 2024
LOOKING FOR: YA, ADULT FICTION, NON-FICTION Laura Williams is literary agent at the Greene and Heaton Literary Agency. She is seeking literary fiction, commercial fiction, psychological thrillers and high concept Young Adult. Laura is actively building a fiction list and a small non-fiction list. She is currently looking for literary fiction, edgy commercial fiction, psychological thrillers and high-concept contemporary young adult, as well as narrative non-fiction of all types. Her taste is quite dark, and she loves gothic, ghost stories, horror and anything sinister. She also loves books that make her cry, from big love stories to intense family dramas. She is open to historical or horror YA, but not magical or fantasy. Meditative or moving novels about modern life, appeal to Laura, sad stories with love and the importance of caring for each other shining through. She also loves stories about female friendships or conversely groups of women who don't get on, such as the hugely fun BAD SUMMER PEOPLE by Emma Rosenblum. She is always on the lookout for a big tragic love story to make her cry happy or sad tears. At the more commercial end of fiction, think funny novels with warmth and romantic comedies with a bit of depth – think Marian Keyes. Most of all Laura is looking for novels she hasn’t read before – something unusual structurally or thematically, something that shines a light on a subject the author is passionate about, something that’ll break her heart or raise her blood in an entirely new way. Laura is always looking to promote diverse voices from across the globe, and is particularly keen on LGBTQI+ stories. Laura would like you to submit a covering letter, a 1-2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Laura is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 25 November 2024
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.