AVAILABLE ONLY TO APPLICANTS WHO HAVE ENROLLED ON (OR HAVE PREVIOUSLY COMPLETED) OUR INTRODUCTION TO PHLEBOTOMY COURSE Geopace Certificate of Competency Add live blood draws to your training Follow and complete a Competency Checklist Obtain tutor sign-off for live draws Awards a CPD Accredited Certificate Awards a Geopace Certificate of Competency Half day or evening sessions
Dyslexia and Working Memory Join me for my most POPULAR Masterclass where we talk all things working memory and dyslexia! About this event Thanks to International Dyslexia Learning Solutions for sponsoring this webinar. Head to their website today to find out how they can support your child/students: Click Here Welcome to my most popular webinar talking all things Working Memory! If you are a parent and or educator and continuously worry about your child's working memory ability, then this session is for you. With over 25 years of special educational needs experience, I am the GO TO expert who will be able to offer you a wide range of tips, strategies and advice when it comes to supporting students/your child who has a weak working memory. In this LIVE event, I will be covering the following: 1. What is working memory? 2. What to look out for if you suspect your child/student has a weak working memory. 3. Strategies to support working memory. 4. Time for Live Q and A with me. Outcomes of this webinar will be: 1. You will have a much better understanding of Working Memory. 2. Understand the impact this has with the school system for those kids who have a weak working memory. 3. How to recognise your child/students are showing signs of a weak working memory. 4. Be ARMED with strategies and tips that can help SUPPORT your child/students in order to make life more manageable for them. 5. Feel more confident about Working memory! My name is Paloma Forde, the founder of Dyslexia Support Services. I am an educator, consultant, author and an international speaker. I have working in the field of SEN for 27 years and have worked across all Key Stages in the education sector. My whole passion now is to pass on my knowledge to others in the hope that we can together make an inclusive world for those children/students who continually struggle in the education system. Did you know that around 45% of students with dyslexia will often have a weak working memory? This means that they are likely to be overloaded in class and miss out on large chunks of learning. Please note that this is a LIVE event via Zoom. This will be recorded if you cannot attend in person. If you want to know more about working memory and or want the right outcome for your child/students who have a weak working memory, then this webinar is for YOU. I look forward to being able to support you in your journey. Any questions just ask away or email me at screen4dyslexia@gmail.com See you soon! Thanks for reading. Paloma Forde - Founder of Dyslexia Support Services. The GO TO Dyslexia Screening Expert Please note that by signing up to my webinar, you will automatically be added to my mailing list. You can unsubscribe at anytime. Tickets are non-refundable.
In this masterclass we'll unravel the complexities of the online world, shedding light on the most pressing current and emerging risks and opportunities faced by children and young people, from the perspective of the DSL, as Online Safety Lead.
This expert-led training course is created and designed to help you gain the skills and confidence needed to help your governing body ensure there is a consistent and effective whole-school approach to safeguarding in place in your school / college.
Join us for an engaging, hands-on sushi masterclass to celebrate Edinburgh 900, marking 900 years of local democracy and the establishment of Edinburgh as a royal burgh! This unique event honours our city’s growth and international community by offering an immersive Japanese culinary experience in South West Edinburgh. Class Overview Introduction to Sushi: Begin with the history and evolution of sushi, from its roots in Japan to its global popularity today. Preparation Essentials: Learn about the ingredients, equipment, and techniques needed to create authentic sushi at home. Demonstration: Watch our sushi chef from Osaka, Seiji (who works in the local restaurant in Dalry, Miju,) demonstrate key techniques, from rice preparation to rolling, folding, and garnishing. Make Your Own: Under expert guidance, you’ll have the chance to make a variety of delicious sushi types and experiment with flavors. Sushi Creations During this class, you’ll learn to prepare a selection of vegetarian sushi, including: Two Types of Vegetable Maki Rolls: Choose from fresh ingredients like cucumber, avocado, kaiso seaweed, and daikon radish. Green Temaki Handroll: A refreshing combination of cucumber, avocado, and daikon in a traditional handroll. Tamago Nigiri: Master the art of making two pieces of Japanese-style egg sushi. Gunkan Sushi: Choose between a kaiso seaweed or tofu pocket Gunkan for a delightful twist. Whether you’re a sushi enthusiast or a beginner, this masterclass offers a welcoming atmosphere to learn, connect, and celebrate the diversity of our community. This class is sponsored by Edinburgh Council. It is FREE and is aimed at our International Community of the South West Edinburgh. (Irish, any other white background, mixed ethnic, Asian/Asian British, Black/African/Caribbean, Black British, Arabic or other ethic groups) By attending this class you release the chef, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, physical reaction, expectations of results, theft in the venue or damages that may happen to people and objects while attending.
Join us in our studio to learn about the joys of botanical resin.
LEARN HYPER-REALISM BROWS FROM AWARD-WINNING WORLD MASTER ARTIST MIRIAM BEGANOVA (@LIMITLESSPMU) AT HER NEW TWO-DAY MASTERCLASS.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. Course Outline Exploring the Functions of Networking ? Lecture Introducing the Host-to-Host Communications Model ? Lecture Operating Cisco IOS Software ? Lecture Introducing LANs ? Lecture Exploring the TCP/IP Link Layer ? Lecture Starting a Switch ? Lecture Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture Explaining the TCP/IP Transport Layer and Application Layer ? Lecture Exploring the Functions of Routing ? Lecture Configuring a Cisco Router ? Lecture Exploring the Packet Delivery Process ? Lecture Troubleshooting a Simple Network ? Lecture Introducing Basic IPv6 ? Lecture Configuring Static Routing ? Lecture Implementing VLANs and Trunks ? Lecture Routing Between VLANs ? Lecture Introducing OSPF ? Lecture Building Redundant Switched Topologies ? Self-study Improving Redundant Switched Topologies with EtherChannel ? Lecture Exploring Layer 3 Redundancy ? Self-study Introducing WAN Technologies ? Self-study Explaining Basics of ACL ? Lecture Enabling Internet Connectivity ? Lecture Introducing QoS ? Self-study Explaining Wireless Fundamentals ? Self-study Introducing Architectures and Virtualization ? Self-study Explaining the Evolution of Intelligent Networks ? Lecture Introducing System Monitoring ? Lecture Managing Cisco Devices ? Lecture Examining the Security Threat Landscape ? Self-study Additional course details: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.