Duration 1 Days 6 CPD hours This course is intended for Individuals responsible for articulating the technical benefits of AWS services Individuals interested in learning how to get started with using AWS SysOps Administrators, Solution Architects and Developers interested in using AWS services Overview Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console. Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS). Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM). Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS). Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor. AWS Technical Essentials introduces you to AWS services, and common solutions. It provides you with fundamental knowledge to become more proficient in identifying AWS services. It helps you make informed decisions about IT solutions based on your business requirements and get started working on AWS. Prerequisites Working knowledge of distributed systems Familiarity with general networking concepts Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 1 - AWS introduction and history AWS Global Infrastructure Demonstration: AWS Management Console 2 - AWS Storage Identify key AWS storage options Describe Amazon EBS Create an Amazon S3 bucket and manage associated objects 3 - Compute, network and storage services Amazon Elastic Compute Cloud (EC2) Amazon Virtual Private Cloud (VPC) Amazon Simple Storage Service (S3) Amazon Elastic Block Store (EBS) Demonstration: Amazon Simple Storage Service (S3) Hands-on lab: Build your VPC and launch a web server 4 - AWS Security, AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) Demonstration: AWS Identity and Access Management (IAM) 5 - Compute Services & Networking Identify the different AWS compute and networking options Describe an Amazon Virtual Private Cloud (VPC) Create an Amazon EC2 instance Use Amazon EBS with Amazon EC2 6 - Managed Services & Database Describe Amazon DynamoDB Understand key aspects of Amazon RDS Launch an Amazon RDS instance 7 - Databases (RDS, DynamoDB) SQL and NoSQL databases Data storage considerations Hands-on lab: Build your database server and connect to it 8 - AWS elasticity and management tools Auto scaling Load balancing Cloud Watch Trusted Advisor Hands-on lab: Scale and load balance your architecture 9 - Deployment and Management Identify what is CloudFormation Describe Amazon CloudWatch metrics and alarms Describe Amazon Identity and Access Management (IAM)
This online course is suitable for those who are familiar with the accounts rules, such as COFA’s and legal cashiers, but wish to expand their technical knowledge on the day to day application of them. This course will reflect on the 2019 rule changes and where firms might have gone wrong in implementing these. It will also consider what ‘good’ systems, policies and procedures look like as well as providing you with tools to evaluate if your interest policy is ‘fair and reasonable’ and practical scenario’s to identify banking facilities. Target Audience This online course is suitable for COFAs, those supporting the COFA, legal cashiers and for those that wish to expand their technical knowledge on the day to day application of the SRA accounts rules. Resources An information pack including the course slides will be provided to all delegates, which may be useful for ongoing reference. Please note a recording of the course will not be made available. Speaker Sarah Charlton, Consultant, DG Legal Sarah has a BSc (Hons) in Applied Accounting and is a Fellow member of the Association of Chartered and Certified Accountants. Her career spans over 35 years working within the legal sector, fulfilling roles from COFA through to CEO. During her career she has worked with a number of legal regulators, professional bodies and government organisations. Sarah has been a member of the Institute of Legal Finance and Management throughout her career, qualifying as a Fellow member in 2005. Sarah also served as chairperson between 2010-2012 and continues to serve as an Executive Council Member.
LOOKING FOR: MG, ADULT FICTION Jo Williamson has been in publishing for over 25 years. Having worked in Children’s books PR for Dorling Kindersley, HarperCollins and Orion, she started as an agent with Antony Harwood in 2008. She feels very privileged being with authors at the very start of their publishing journey and enjoys close working relationships with all her clients. From editorial help, general advice on the publishing world, guiding careers long-term and general cheerleading, she feels she has the perfect job. Although nothing is off limits and she loves being surprised by submissions, In middle grade children's fiction, Jo is particularly looking for books with heart, epic adventures with voice-led characters, and younger funny fiction with series potential. In adult fiction, page-turning Commercial Women’s and Book Club fiction are right up Jo's street, including psychological suspense, thriller, cosy crime and books that don’t quite fit the mould. Above all, she wants stories that linger long after the final page has been read. Jo is not the right fit for police procedurals. Jo would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Jo is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 4 November 2024
Course Outcomes As an MHFAider® you will be able to: Recognise those that may be experiencing poor mental health and provide them with first-level support and early intervention Encourage a person to identify and access sources of professional help and other supports Practise active listening and empathy Have a conversation with improved mental health literacy around language and stigma Discuss the MHFAider® role in depth, including boundaries and confidentiality Practise self-care Know how to use the MHFAider Support App® Know how to access a dedicated text service provided by Shout and ongoing learning opportunities with MHFA England Format Learners will be trained over four live sessions with an MHFA England Instructor Member, covering 14 hours of content in total. Learning takes place through a mix of instructor led training, group discussions, individual and group activities. Each session builds on the previous, enabling the learner to gain confidence in supporting others with a Mental Health First Aid action plan. We limit numbers to 16 people per course so that instructors can keep people safe and supported while they learn. We strive for all of our learning content to be as accessible and inclusive as possible. Takeaways Everyone who completes this course gets: A hard copy workbook to support their learning throughout the course A digital manual to refer to whenever they need it after completing the course A wallet-sized reference card with the Mental Health First Aid action plan A digital MHFAider® certificate Access to the MHFAider Support App® for three years Access to ongoing learning opportunities, resources and exclusive events The opportunity to be part of the largest MHFAider® community in England Becoming a qualified MHFAider® Once you complete the Mental Health First Aid course, you can test your knowledge and build your confidence in your role as an MHFAider® with the internationally recognised MHFAider® qualification, RSPH Level 3 Award in Mental Health First Aid. Course Structure Session 1: Mental Health First Aid and the action plan The MHFAider® role and self-care Helpful and unhelpful language Useful models to support the role Session 2: What influences mental health? What is anxiety? Crisis first aid Active listening and empathy What are eating disorders? What is self-harm? What is substance misuse? Session 3: Applying the Mental Health First Aid action plan What is depression? What is suicide? Crisis first aid continued What is psychosis? Session 4: Recovery and lived experience Boundaries in the MHFAider® role Moving forward in the MHFAider® role My MHFA action plan
We are hosting a free virtual co-working session, to help qualitative researchers get their work done in a supportive and motivating space.
Mastering Compliance and Safety on the Road This essential 7 hours course is designed to equip professional drivers with the knowledge and skills necessary to comply with complex driving regulations and ensure safe loading practices. Key areas covered include: Drivers’ Hours and Working Time Regulations: Gain a comprehensive understanding of driving and rest periods, breaks, and exemptions to avoid penalties and ensure driver well-being. Tachograph Regulations: Learn how to correctly use and interpret analog and digital tachographs to accurately record driving activities and comply with legal requirements. Course format: Online. Invest in your professional development and become a safer, more compliant driver.
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
LOOKING FOR: ADULT FICTION, NON-FICTION Liza represents a range of fiction and non-fiction. On the fiction side, she is looking for historical fiction that is well researched, immerses readers in the era, and looks at overlooked characters from the past, or perhaps gives a new spin on someone we think we know. On the literary and upmarket side, she is looking for novels infused with emotions that capture the human experience and make readers think. If your literary novel is something at A24 productions might turn into a movie, this is Liza’s taste. When it comes to fantasy, she loves urban and grounded fantasy (no sci-fi please!), and is always happy to look at anything with a vampire, werewolf, witches, warlocks, fairies, and perhaps a sinister selkie or two. She is also very much looking for romantasy and is the best person at the agency to submit that too. For thrillers, send her anything set in an exotic location, high-concept, or things with a speculative twist. She loves when characters are put in situations she would never want to be in, and then they have to get out of it. Her recent favourite fiction includes: Notes on an Execution, Lady Macbethad, Hamnet, A Discovery of Witches, House of Earth and Blood, The Starless Sea, Piranesi, Our Wives Under the Sea, The Pisces, Such A Fun Age. When it comes to non fiction, she is looking for books that teach her something new or reframe a topic from an alternative point of view. This can include cookery, pop science, and social history. Liza’s recent favourite non-fiction include: The Five, A History of Art Without Men, Messalina, The Authority Gap, Finding The Mother Tree, Cook This Book, Dessert Person. Liza would like you to submit a covering letter, 1 - 2 page synopsis and the first 5000 words of your manuscript in a single word document. (In addition to the paid sessions, Liza is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 6 November 2024
Duration 5 Days 30 CPD hours This course is intended for This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience. Overview Upon successful completion of this course, students will be able to: Identify enterprise security fundamentals. Apply enterprise security technology solutions. Implement security design and solutions. Manage risk, policies and procedures within an enterprise. Integrate security solutions within an enterprise. Conduct security research and analysis. In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. Prerequisites CompTIA Cybersecurity Analyst (CySA+) Certification 1 - Enterprise Security Architecture The Basics of Enterprise Security The Enterprise Structure Enterprise Security Requirements 2 - Enterprise Security Technology Common Network Security Components and Technologies Communications and Collaboration Security Cryptographic Tools and Techniques Advanced Authentication 3 - Enterprise Resource Technology Enterprise Storage Security Issues Distributed, Shared, and Virtualized Computing Cloud Computing and Security 4 - Security Design and Solutions Network Security Design Conduct a Security Assessment Host Security 5 - Application Security Design Application Security Basics Web Application Security 6 - Managing Risk, Security Policies, and Security Procedures Analyze Security Risk Implement Risk Mitigation Strategies and Controls Implement Enterprise-Level Security Policies and Procedures Prepare for Incident Response and Recovery 7 - Enterprise Security Integration The Technology Life Cycle Inter-Organizational Change Integrate Enterprise Disciplines to Achieve Secure Solutions 8 - Security Research and Analysis Perform an Industry Trends and Impact Analysis Perform an Enterprise Security Analysis