• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4356 Strength courses

Sew a Quilted Project Bag

By Loopy's Place

Join our hands-on sewing class at Loopy's Place in Sheffield, UK, where you'll learn to create a quilted project bag. Explore fabric choices, quilting techniques, and master the art of adding zippers, tabs, and French seam boxed corners. All materials are provided, making it the perfect opportunity to enhance your sewing skills and craft a practical and stylish project bag.

Sew a Quilted Project Bag
Delivered In-PersonFlexible Dates
£50

NASM Senior Fitness Specialist (SFS)

5.0(13)

By Platinum Training Institute

Play an important part in keeping active older adults healthy! There are currently over 54 million adults over the age of 65 living in the United States, and that number is projected to continue to grow. Senior Fitness Specialists have a unique opportunity to work with the growing older adult population and help them improve their health by providing safe and effective exercise programs that use NASM’s Optimum Performance Training (OPT™) Model program. Our Senior Fitness Specialization provides an immersive online learning experience for fitness professionals, teaching innovative ways to design individualized programs to meet the needs of active aging adults through evidence-based practices. Addressing physiological and psychological needs, this course will provide the application needed to create a positive, comfortable trainer-client relationship and help older adult clients achieve their goals and overcome obstacles.

NASM Senior Fitness Specialist (SFS)
Delivered Online On Demand
£100 to £150

Live & Dance - For Old, Young, Dancers And Non-Dancer

By Daniel Navarro Lorenzo

The classes are an opportunity for everyone from different countries to dance together - old, young, dancers and non-dancers - and to move, stay healthy.

Live & Dance - For Old, Young, Dancers And Non-Dancer
Delivered OnlineFlexible Dates
£5

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

BELLY DANCE BEGINNERS COURSE

5.0(7)

By Discover Dance UK

Learn to Belly Dance in a short time in this level 1 course and have fun working out whilst learning a new skill in your own time, at your own pace and in your own space, no matter where you are!

BELLY DANCE BEGINNERS COURSE
Delivered Online On Demand
£95

Gym Instructor Training: Building Fitness Programs for Clients (QLS Endorsed)

By Imperial Academy

Level 5 QLS Diploma Course | QLS Endorsed Certificate Included | 10 CPD Courses & PDF Certificates | 200 CPD Points

Gym Instructor Training: Building Fitness Programs for Clients (QLS Endorsed)
Delivered Online On Demand
£129

2022 November Activation: 11-11 Ascension Portal

By Katarina Heuser

Discover your special powers, receive insights and deep healing together with an abundance of light codes taking your life to the next level!

2022 November Activation: 11-11 Ascension Portal
Delivered OnlineJoin Waitlist
£45

Dynamic QDRs (Improvers)

By Floorwork Academy

What you get The pillars of Movement Our different tutorials take you through an in-depth study of technical concepts – efficiency, momentum, transitioning, weight management, spirals of motion, techniques of improvisation – to improve your flow. An extensive library of moves All my tutorials have been regrouped in one membership. Hundreds of videos to increase your movement vocabulary and lay the foundations for sequencing and freestyling, as well as dozens of sequences to integrate them and dozens of drills to learn to improve your flow. Develop a well-rounded softness The strength, mobility and body awareness you will develop through this course can be used to sustain a standalone practice or complement your own, whether it is dance, movement, yoga, pole dance or aerials.

Dynamic QDRs (Improvers)
Delivered Online On Demand
£60

Crochet-Along | CNY Tallulah the Tiger (Amigurumi)

By Sew Silly Lily

Celebrate Chinese New Year and the year of the tiger with this special Amigurumi crochet-along - Tallulah the Tiger!

Crochet-Along | CNY Tallulah the Tiger (Amigurumi)
Delivered OnlineFlexible Dates
£15

Java Certification Training Course

5.0(10)

By Apex Learning

Give a compliment to your career and take it to the next level. This Java Certification Training Course bundlewill provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this Java Certification Training Coursebundle will help you stay ahead of the pack. Throughout the Java Certification Training Courseprogramme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Java Certification Training Course course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Java Certification Training Course Bundle Consists of the following Premium courses: Course 01: Java Certification Cryptography Architecture Course 02: jQuery: JavaScript and AJAX Coding Course 03: SQL Programming Masterclass Course 04: Ultimate PHP & MySQL Web Development Course & OOP Coding Course 05: Cocos2d-x v3 JavaScript: Game Development Course 06: jQuery: JavaScript and AJAX Coding Bible Course 07: Intermediate Python Coding Course 08: Mastering Java for Beginners & Experts Course 09: Coding with HTML, CSS, & Javascript Course 10: WordPress Website Creation and Hosting System with Affiliate Marketing! Course 11: Front End Web Development Diploma Course 12: Learn Ethical Hacking From A-Z: Beginner To Expert Course 13: Master JavaScript with Data Visualization Course 14: Creative Thinking for Everyday Life Course 15: Stress Management Training Enrol now in Java Certification Training Course to advance your career, and use the premium study materials from Apex Learning. The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Java Certification Training Course expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Course Curriculum: (Title Course Only) Section 01: Introduction Introductory Lecture Setup Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example Real-world Hashing Example Efficient Stream-Based Hashing Message Authentication Code (MAC) Secure Password Hashing with PBKDF2/PKCS#5 Section 03: Outro Commercial Wrapper Libraries: Demo JCE Unlimited Strength Policy File Installation CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Java Certification Training Course bundle. Requirements This Java Certification Training Course course has been designed to be fully compatible with tablets and smartphones. Career path Having this expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Cost of PDF Certificates is included in course price Certificate of completion Hard copy certificate - £9.99 You will get the Hard Copy certificate for the title course (Title Course) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Java Certification Training Course
Delivered Online On Demand
£200