Dive into the mesmerizing realm of animation and visual effects with our comprehensive 'Adobe After Effects CC Course.' Unleash your creativity as you journey through an extensive curriculum designed to transform novices into proficient animators. This course is not just about mastering tools; it's about crafting visual stories that captivate and inspire. From the basics of the After Effects workspace to advanced techniques in character animation, each module is a stepping stone towards unlocking your artistic potential. In this visually dynamic expedition, you'll animate your name, create motion graphics projects, replace screens seamlessly, delve into 3D animation, and even explore the fascinating world of character animation. Our modules are structured to guide you through the intricacies of After Effects, offering hands-on challenges and solutions to enhance your skills. Join us on this thrilling ride, where you're not just learning software - you're becoming a visual storyteller. Learning Outcomes Master the After Effects workspace and essential tools. Create captivating animations with position, scale, and rotation. Utilize advanced techniques like motion tracking and rotoscoping. Develop motion graphics projects, from lower thirds to transitions. Harness the power of expressions for dynamic animations. Why choose this Adobe After Effects CC Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Adobe After Effects CC Course for? Aspiring animators and visual storytellers. Graphic designers eager to add motion to their creations. Video editors looking to enhance their post-production skills. Content creators aiming for engaging and dynamic visual content. Anyone passionate about exploring the artistry of animation. Career path Motion Graphics Designer: £25,000 - £40,000 Visual Effects Artist: £30,000 - £50,000 Animation Specialist: £28,000 - £45,000 Video Content Creator: £22,000 - £35,000 Multimedia Animator: £26,000 - £42,000 Digital Media Producer: £32,000 - £48,000 Prerequisites This Adobe After Effects CC Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Adobe After Effects CC Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module: 01 1.1 Intro Video 00:03:00 1.3 Animate Your Name 00:07:00 Module: 02 2.1 Understand the After Effects Workspace 00:06:00 2.2 Starting a New Composition 00:08:00 2.3 Adding Media to Your Project and Timeline 00:05:00 2.4 Using the Basic After Effects Tools 00:10:00 2.5 Create a Perfect Circle, Alignment, and Shape Colors 00:03:00 2.6 Working in the Timeline 00:11:00 2.7 Layer Properties 00:09:00 Module: 03 3.1 Animating in After Effects 00:08:00 3.2 Position, Scale, and Rotation Animations 00:05:00 3.3 Tips to Make Your Animations Look More Nautral 00:04:00 3.4 Using the Graph Editor 00:06:00 3.5 Challenge - Bouncing Ball 00:01:00 3.6 Solution - Bouncing Ball 00:20:00 Module: 04 4.1 Working With Solid Layers and the ken Burns Effects 00:07:00 4.2 Working With Shape Layers, Strokes, and Paths 00:06:00 4.3 Adding Layer Styles Like Drop Shadow, Bevel, and Gradients 00:04:00 4.4 Shape Effects - Trim Path Animation, Wiggle, and Zig Zag 00:06:00 Module: 05 5.1 Track Matte Animation - Make Layers Appear And Disappear 00:09:00 5.2 Using Pre-Compositions to Group Layers 00:06:00 5.3 Easily Reverse Complicated Animations 00:02:00 5.4 Playing with Time 00:06:00 5.5 Blend Modes 00:06:00 5.6 Stabilize Shaky Footage 00:04:00 Module: 06 6.1 Intro to Motion Graphics Projects 00:01:00 6.2 Clean Lower Third 00:09:00 6.3 Logo Reveal Animation Bumper 00:13:00 6.4 Colorful Transition 00:17:00 6.5 Text with Mask Path Animation 00:10:00 6.6 Text Bubble Animation 00:14:00 6.7 Weather App 1 00:17:00 6.8 Weather App 2 00:08:00 6.9 Weather App 3 00:07:00 Module: 07 7.1 Flat Animation Challenge 00:03:00 7.2 Phil Designs his Flat Animation Scene 00:13:00 7.3 Animating Fireworks with the Repeater Effect 00:15:00 Module: 08 8.1 Removing Green Screen Backgroundc 00:07:00 8.2 Adding a Background that Matches the Foreground 00:08:00 8.3 Adding Motion to a Still Image with the Puppet Tool 00:06:00 8.4 Adding Movement with the Ripple Effect 00:06:00 Module: 09 9.1 Intro to 3D 00:10:00 9.2 Swinging 3D Text Animation 00:12:00 9.3 Build Out Your 3D Composition 00:06:00 9.4 Animating Our 3D Scene 00:08:00 9.5 Create Stars in After Effects 00:05:00 Module: 10 10.1 Using the Rotoscope Tool 00:07:00 10.2 Cleaning Up Your Edges 00:07:00 10.3 Finishing Our Rotobrush Animation 00:08:00 Module: 11 11.1 Easy Screen Replacement with Masks 00:10:00 11.2 Replacing a Screen Version 2 00:14:00 11.3 Screen Replacement with Mocha 00:08:00 Module: 12 12.1 Using the Puppet Pin Tool 00:05:00 12.2 Animating Your Puppet Pins 00:03:00 12.3 Animated Blinking Eyes 00:08:00 12.4 Adding Perspective with Animated Clouds 00:07:00 Module: 13 13.1 Applying Text Animation Presets 00:06:00 13.2 Create a page Turn Effect with CC page Turn 00:10:00 13.3 Radial and Linear wipes 00:03:00 13.4 Color Correction in After Effects 00:04:00 Module: 14 14.1 Motion Tracking Basics 00:10:00 14.2 Tracking Text and Visual Effects to Video Clip 00:06:00 14.3 Tracking Rotation and Scale 00:12:00 14.4 Adding Details to Our Text 00:04:00 Module: 15 15.1 Intro to Character Animation 00:02:00 15.2 Design Your Character 00:15:00 15.3 Rigging Your Character 00:03:00 15.4 animation Our Character 00:10:00 15.6 Adding Details to Character Movement 00:07:00 15.7 Adding the Paper Cut Out Look 00:06:00 Module: 16 16.1 Exporting an H264 File From After Effects 00:07:00 16.2 Exporting from After Effects with a Transparent Background 00:04:00 16.3 Exporting from After Effects through Adobe Media Encoder 00:05:00 16.4 Create an Animated GIF from After Effects 00:07:00 Module: 17 17.1 Audio Tips for After Effects 00:03:00 17.2 Working with Premiere Pro 00:06:00 Module: 18 18.1 Expressions Basics 00:07:00 18.2 Animate a Flickering with Expressions 00:18:00 Module: 19 19.1 Conclusion 00:01:00 Resources Resources -Adobe After Effects CC Course 00:00:00 Assignment Assignment - Adobe After Effects CC Course 00:00:00
Thinking about learning more understanding the role of data within an organisation? As data becomes an important currency in the world and an enabler for the future, it is imperative that all organisations have a firm understanding of the data available to them and the power it can hold. The BCS Foundation Award in Understanding Data in your Organisation teaches the the terminology, principles, concepts and approaches used within data management, and the overall value of data to an organisation.
Sage Bookkeeping: Sage Bookkeeping Training Would you like to acquire a basic grasp of bookkeeping? If yes, you are going to enjoy our Sage Bookkeeping: Sage Bookkeeping for Personal and Business Accounting course! The Sage Bookkeeping: Sage Bookkeeping Online for Personal and Business Accounting course delves into the fundamentals of financial record-keeping. This Sage Bookkeeping: Sage Bookkeeping Online for Personal and Business Accounting course also covers double-entry bookkeeping. Moreover, the Sage Bookkeeping for Personal and Business Accounting involves transaction recording and financial statement creation. With a focus on both personal and business accounting, Sage Bookkeeping: Sage Bookkeeping for Personal and Business Accounting participants gain practical skills in budgeting, expense tracking, and utilizing Sage accounting software. Unlock our Sage Bookkeeping: Sage Bookkeeping Online for Personal and Business Accounting course to foster financial literacy for individuals and equip entrepreneurs for effective business accounting! Special Offers of this Sage Bookkeeping: Sage Bookkeeping Training Course This Sage Bookkeeping: Sage Bookkeeping Training Course includes a FREE PDF Certificate. Lifetime access to this Sage Bookkeeping: Sage Bookkeeping Training Course Instant access to this Sage Bookkeeping: Sage Bookkeeping Training Course 24/7 Support Available to this Sage Bookkeeping: Sage Bookkeeping Training Course [ Note: Free PDF certificate as soon as completing the Sage Bookkeeping: Sage Bookkeeping Training Course] Sage Bookkeeping: Sage Bookkeeping Training Unlock the power of financial management with our Sage Bookkeeping: Sage Bookkeeping Online for Personal and Business Accounting course. This Sage Bookkeeping: Sage Bookkeeping course covers the fundamentals of financial record-keeping, providing you with a comprehensive understanding of bookkeeping practices. Dive into double-entry bookkeeping with Sage Bookkeeping: Sage Bookkeeping to master the essentials. Additionally, Sage Bookkeeping: Sage Bookkeeping involves transaction recording and financial statement creation for effective accounting. Whether you're focused on personal or business accounting, the Sage Bookkeeping: Sage Bookkeeping course equips you with practical skills in budgeting, expense tracking, and using Sage Bookkeeping: Sage Bookkeeping software to optimize your financial management. Certificate of Completion You will receive a course completion certificate for free as soon as you complete the Sage Bookkeeping: Sage Bookkeeping Training Course. Who is this course for? Sage Bookkeeping: Sage Bookkeeping Training Anyone who has a passion for establishing a career in this sector can take our Sage Bookkeeping: Sage Bookkeeping Training course. Requirements Sage Bookkeeping: Sage Bookkeeping Training To enrol in this Sage Bookkeeping: Sage Bookkeeping Training Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Sage Bookkeeping: Sage Bookkeeping Training Course. Be energetic and self-motivated to complete our Sage Bookkeeping: Sage Bookkeeping Training Course. Basic computer Skill is required to complete our Sage Bookkeeping: Sage Bookkeeping Training Course. If you want to enrol in our Sage Bookkeeping: Sage Bookkeeping Training Course, you must be at least 15 years old. Career path Sage Bookkeeping: Sage Bookkeeping Training After finishing this course on Sage Bookkeeping: Sage Bookkeeping Training Online for personal and business accounting, you can start career as entrepreneur, your own business or choose to work in the accounting field.
In this course, we will be using Django 3 to build 3 stunning websites with HTML5, CSS3, and Bootstrap 4. This format will allow you to learn Django and not just follow along like a robot. We will use Python in this course, so if you have never used Python before, we will start with a Python refresher to get you up to speed (no other Python experience required).
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Phone Network Administrators Phone Network Engineers Data System Administrators Entry-level Network Engineers Channel Partners/Resellers, Customers, Employees Overview Describe the Cisco Unified Communications Manager network, service, and features Understand the importance of and configuration of redundancy and high availability in the enterprise network Describe user configuration and the user web interface Explain basic phone options and the use of BAT Explain the route plan and on-net/off-net calling Describe the various media resources, including conferencing and MOH Describe the basic phone features and use of hunt groups Administering Cisco Unified Communications Manager (ACUCM) v12.0 is a 3-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involves routers, switches, or Cisco IOS software configuration. Exploring IP Telephone Traditional Voice versus IP Telephony Clustering Overview Intracluster Communications Cisco Unified Communications Manager Clusters Clustering Options Platform Requirements Describing Deployment Models Single-Site Deployment Centralized Call-Processing Deployment Distributed Call-Processing Deployment Distributed Single-Cluster Call-Processing Deployment Hybrid Call-Processing Deployment New Advanced Multicluster Options Understanding Advanced Multisite Features Need for CAC Deploying AAR Survivable Remote Site Telephony SRST Failover Logging in to Cisco Unified Communications Manager Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability Logging In to Cisco Unified Operating System Administration and the DRS Navigation Menu Command-Line Interface Examining Basic Server Configuration Server Configuration?Eliminating DNS Reliance Configuring Enterprise Parameters Describing Multilevel Administration Configuring Multilevel Administration Creating End Users Creating Roles Creating User Groups Assigning Users to User Groups Configuring DRS Backup and Restore Procedures DRS Backup Procedures DRS Restore Procedures Understanding User Configuration Understanding User Management Configuring Users Using the User Web Pages Understanding the User Web Pages Using the User Web Pages Configuring System Parameter Cisco Unified CM Configuration Cisco Unified Communications Manager Group Configuration Phone NTP Configuration Date/Time Group Codecs and Regions Location Configuration Device Pool Configuration DHCP Service Configuration Device Defaults Configuration Clusterwide Parameters Licensing Supporting Cisco Unified IP Phones Cisco Unified IP Phones Overview Specialized Cisco Unified IP 7900 Series Phones Phone Button Templates Softkey Templates Exploring Phone Registration and IP Phone Communications Cisco Unified IP Phone Registration Cisco Unified IP Phone Configuration Utilizing the Bulk Administration Tool (BAT) Overview of Cisco Unified Communications Manager BAT Cisco Unified Communications Manager TAPS Implementing Dial Plan Connectivity Organizational Dial Plan Trunks Gateways Creating Route Plans Dial Plan Overview Route Pattern Overview Digit Collection Call Routing Configuring Transition Patterns and Route Filters Translation Patterns The 9.@ Pattern Route Filters Implementing Digit Manipulation Discard Digits Instruction Transformation Masks Route Plan Report Defining Class of Control Overview of Class of Control Partitions CSS Configuration PLAR Application Using Class of Control Features Call Restriction Time of Day Routing Traditional vs. Line/Device Approach Defining Media Resources Overview of Media Resources Conference Bridge Media Termination Points Transcoder Music on Hold Annunciator Exploring Media Resource Management MRG Management Configuring MRGs Configuring MRGLs Describing Basic Features Call Park Call Pickup Cisco Call Back Shared Lines with Barge and Privacy Exploring Hunt Groups Hunt Group Overview Line Group Configuration Hunt List Configuration Hunt Pilot Configuration Final Forwarding Describing Phone Services Cisco IP Phone Services Cisco Phone Services Configuration
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
This video course is designed to prepare you to achieve the AWS Certified Solution Architect Associate SAA-C02 exam. The course covers all the major domains needed for the certification and will help you develop the basics of AWS.