Managing Stress and Building Resilience: Virtual In-House Training Stress has an impact on all of us at some point in our professional lives. Learning how to manage stress and build resilience will result in higher professional productivity, better health, and more sustainable living habits. It will also help us create a physical - and emotional - work-life balance. In this one-day workshop, you will learn practical solutions to sustain behavior change that can positively impact your life on both a professional and personal level. When you are able to reduce the level of negative stress that affects you, your performance improves, along with your health and happiness. The objective of this course is therefore not only to create awareness around emotional well-being in a work context, but also to help participants create a better overall balance between the investment they make in their personal and professional lives. This course covers how our perceptions affect our beliefs and how our beliefs affect our actions. You will learn a host of stress-reduction techniques, while exploring your own stress triggers and responses. Highly interactive, the sessions cover a blend of theory, discussions, and exercises. You will explore concepts with fellow participants within a safe environment where skills and habits can be developed, sharpened, and improved. What You Will Learn At the end of this program, you will be able to: Identify what stress feels like and what the typical symptoms and reactions are to stress Analyze your own responses to stressful events and the consequences of those reactions Organize your work structure to reduce stress and build resilience Recognize activities that drain you and those that give you energy Generate relief from stressful events Cultivate a mindset of resilience Better manage your time, work commitments, and personal boundaries in order to be most effective at your job Getting Started What is stress? Beliefs and thinking errors Work-life balance Drainers and energizers Stress reduction techniques Time management Summary and Next Steps
Managing Stress and Building Resilience: In-House Training Stress has an impact on all of us at some point in our professional lives. Learning how to manage stress and build resilience will result in higher professional productivity, better health, and more sustainable living habits. It will also help us create a physical - and emotional - work-life balance. In this one-day workshop, you will learn practical solutions to sustain behavior change that can positively impact your life on both a professional and personal level. When you are able to reduce the level of negative stress that affects you, your performance improves, along with your health and happiness. The objective of this course is therefore not only to create awareness around emotional well-being in a work context, but also to help participants create a better overall balance between the investment they make in their personal and professional lives. This course covers how our perceptions affect our beliefs and how our beliefs affect our actions. You will learn a host of stress-reduction techniques, while exploring your own stress triggers and responses. Highly interactive, the sessions cover a blend of theory, discussions, and exercises. You will explore concepts with fellow participants within a safe environment where skills and habits can be developed, sharpened, and improved. What You Will Learn At the end of this program, you will be able to: Identify what stress feels like and what the typical symptoms and reactions are to stress Analyze your own responses to stressful events and the consequences of those reactions Organize your work structure to reduce stress and build resilience Recognize activities that drain you and those that give you energy Generate relief from stressful events Cultivate a mindset of resilience Better manage your time, work commitments, and personal boundaries in order to be most effective at your job Getting Started What is stress? Beliefs and thinking errors Work-life balance Drainers and energizers Stress reduction techniques Time management Summary and Next Steps
Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
Description Would you like to start and host your podcast show? This course will explain exactly what you need to do to start your own podcast show! We look at what equipment to get, what software to use, recording your show, show format, editing your podcasts, choosing music, legal issues, your hosting options, how to upload and submit your podcast to itunes and the best directories out there and how to monetise and market your show. We start right from the very beginning. No previous experience of any of the above is assumed. We look at what a podcast is, the history of podcasting, the benefits of getting into podcasting and how to do it. Every step of the way is broken down. We don't just 'tell' you, we show you. The videos are clear, step by step, right from your podcast idea right up until submission and promoting your show. Podcasting is an amazing way to promote your brand and for you to promote yourself and become a leading authority in your chosen niche. There are far more blogs on the internet then they are podcasts. As a marketing medium and a direct channel of communication to your target audience, in terms of price comparison, and effectiveness of audience attention - very little measures up to a podcast! You have the undivided attention of your listener, they subscribe to your show, you have the opportunity to literally 'talk' to them ... what other medium or method can compare to this? A podcast can open new doors and opportunities unlike any other. This course looks at the most cost effective methods to achieve a podcast - your host has done all of the legwork and research for you. Save yourself a lot of time effort and energy by taking this course and learning exactly what to do and let us walk you through it. You don't need expensive editing equipment. You don't need to be in a recording studio and you don't need to spend a small fortune on voice over recording artists. You can can start your own podcast show this week (literally) with exactly what you have right now. We do look at different microphones on the market, and we look at which one to go for. We completely demystify and break down the process. If you want to start your own podcast show - this course will show you exactly what to do.... step-by-step. There is an extensive editing section - so you know how to edit your podcast and we look at the various means of monetising your work. Your course tutor is the host of The Authors Podcast which can be found on iTunes and she shows you step-by-step how to host your show, upload your show, name your show, edit your show and submit your show for acceptance. Progressive people, self-starters, those who want to get somewhere in life - achievers! Who is the target audience? Interested in starting your own podcast show What Will I Learn? Start your own podcast show Record and edit your own podcast Submit your podcast show to itunes and other directories Ways to market and promote your show Requirements No prerequisites Introduction to the course and your tutor Introduction to the course FREE 00:05:00 A brief history FREE 00:09:00 Why do you want to start a podcast? 00:18:00 Preparing for your podcast 00:06:00 Preparation 00:14:00 Equipment needed 00:19:00 Microphones 00:14:00 Software to edit your podcast 00:09:00 How to prepare 00:11:00 Editing your podcast How to create an interlude with music 00:14:00 Editing a podcast with Audacity - part 1 00:17:00 Editing a podcast with Audacity - part 2 00:16:00 Inserting an interlude 00:10:00 More editing to finish - part 1 00:15:00 More editing to finish - part 2 00:17:00 Ending the podcast - adding an outro 00:08:00 Editing 00:02:00 Editing masterclass tips 00:13:00 Replacing one interlude with another 00:14:00 Legal issues 00:06:00 Publishing your podcast How to publish 00:13:00 Join the podbean affiliate program 00:06:00 Why podbean? 00:05:00 Publish a podcast on podbean 00:11:00 Publishing - part 1 00:18:00 Publishing - part 2 00:17:00 Unmuting a file on audacity 00:03:00 Podbean - final publishing 00:19:00 Downloading itunes 00:03:00 Installing itunes and logging in 00:02:00 Testing your feed 00:07:00 Validate your feed 00:12:00 Itunes store submission 00:10:00 Marketing Directories 00:09:00 Itunes accepted and social media promotion 00:19:00 Stitcher and other submissions 00:24:00 Marketing tips 00:06:00 Show Me The Money! Podcasting Tips 00:05:00 Monetizing Your Podcast 00:16:00 Budget 00:06:00 Conclusion and Next Steps Conclusion and Next Steps 00:04:00
Discover the secrets of the Italian pasta with this online cooking class. Learn how to make pasta according to tradition without the pasta machine.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F
Network fundamentals training course description An intensive hands on IP foundation leading to LINX Accredited Internet Technician stage 1. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT I certification, is available after the course. The exam consists of 40 questions and lasts 1.5 hours. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network fundamentals training course details Who will benefit: Network engineers. Prerequisites: None Duration 5 days Network fundamentals training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.