Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This five-day programme empowers participants with the skills and knowledge to understand and effectively apply best practice commercial and contracting principles and techniques, ensuring better contractor performance and greater value add. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Practitioner (CCMP) qualification. By the end of this comprehensive programme the participants will be able to: Develop robust contracting plans, including scopes of work and award strategies Undertake early market engagements to maximise competition Conduct effective contracting and commercial management activities, including ITT, RFP, negotiated outcomes Understand the legalities of contract and commercial management Negotiate effectively with key stakeholders and clients, making use of the key skills of persuading and influencing to optimise outcomes Undertake effective Supplier Relationship Management Appreciate the implications of national and organisational culture on contracting and commercial activities Appreciate professional contract management standards Set up and maintain contract and commercial management governance systems Take a proactive, collaborative, and agile approach to managing commercial contracts Develop and monitor appropriate and robust KPIs and SLAs to manage the contractor and facilitate improved contractor performance Appreciate the cross-functional nature of contract management Collaborate with clients to deliver sustainable performance and to manage and exceed client expectations Understand the roles and responsibilities of contract and commercial managers Use effective contractor selection and award methods and models (including the 10Cs model) and use these models to prepare robust propositions to clients Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Effectively manage the process of change, claims, variations, and dispute resolution Develop and present robust propositions Make appropriate use of best practice contract and commercial management tools, techniques, and templates DAY ONE 1 Introduction Aims Objectives KPIs Learning strategies Plan for the programme 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Critical success factors Essential features of professional commercial and contract management and administration The 6-step model 4 Putting the 'management' into commercial and contract management Traditional v 'new age' models The need for a commercial approach The added value generated 5 Definitions 'Commercial management' 'Contract management' 'Contracting' ... and why have formal contracts? 6 Stakeholders Stakeholder mapping and analysis The 'shared vision' concept Engaging with key functions, eg, HSE, finance, operations 7 Roles and responsibilities Contract administrators Stakeholders 8 Strategy and planning Developing effective contracting plans and strategies DAY TWO 1 Contract control Tools and techniques, including CPA and Gantt charts A project management approach Developing effective contract programmes 2 The contracting context Key objectives of contract management Importance and impact on the business 3 Tendering Overview of the contracting cycle Requirement to tender Methods Rationale Exceptions Steps Gateways Controls One and two package bids 4 Tender assessment and contract award I - framework Tender board procedures Role of the tender board (including minor and major tender boards) Membership Administration Developing robust contract award strategies and presentations DAY THREE 1 Tender assessment and contract award II - processes Pre-qualification processes CRS Vendor registration rules and processes Creating bidder lists Disqualification criteria Short-listing Using the 10Cs model Contract award and contract execution processes 2 Minor works orders Process Need for competition Role and purpose Controls Risks 3 Contract strategy Types of contract Call-offs Framework agreements Price agreements Supply agreements 4 Contract terms I: Pricing structures Lump sum Unit price Cost plus Time and materials Alternative methods Target cost Gain share contracts Advance payments Price escalation clauses 5 Contract terms II: Other financial clauses Insurance Currencies Parent body guarantees Tender bonds Performance bonds Retentions Sub-contracting Termination Invoicing 6 Contract terms III: Risk and reward Incentive contracts Management and mitigation of contractual risk DAY FOUR 1 Contract terms IV: Jurisdiction and related matters Applicable laws and regulations Registration Commercial registry Commercial agencies 2 Managing the client-contractor relationship Types of relationship Driving forces Link between type of contract and style of relationships Motivation - use of incentives and remedies 3 Disputes Types of dispute Conflict resolution strategies Negotiation Mediation Arbitration DAY FIVE 1 Performance measurement KPIs Benchmarking Cost controls Validity of savings Balanced scorecards Using the KPI template 2 Personal qualities of the contract manager Negotiation Communication Persuasion and influencing Working in a matrix environment 3 Contract terms V: Drafting skills Drafting special terms 4 Variations Contract and works variation orders Causes of variations Risk management Controls Prevention Negotiation with contractors 5 Claims Claims management processes Controls Risk mitigation Schedules of rates 6 Close-out Contract close-out and acceptance / completion HSE Final payments Performance evaluation Capturing the learning 7 Close Review Final assessment Next steps
Highlights of the Course Course Type: Online Learning Duration: 17 Hours 21 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about python programming Understand the core competencies and principles of python programming Explore the various areas of python programming Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert python programmer and developer Python Hacking Masterclass Course Master the skills you need to propel your career forward in python programming. This course will equip you with the essential knowledge and skillset that will make you a confident python programmer and developer and take your career to the next level. This comprehensive python hacking masterclass course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this python hacking masterclass course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective python programming practice and equip you with the essential skills, confidence and competence to assist you in the python programming industry. You'll gain a solid understanding of the core competencies required to drive a successful career in python programming. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for python programmer and developer or for people who are aspiring to specialise in python programming. Enrol in this python hacking masterclass course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive python hacking masterclass course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this python programming can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This python hacking masterclass course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This python hacking masterclass course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This python hacking masterclass course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction and Setup Welcome to Python for ethical hacking! 00:05:00 VirtualBox Installation 00:12:00 Kali Linux Installation 00:17:00 Adding Guest Additions 00:15:00 Adding Guest Additions 00:15:00 Port and Vulnerability Scanning Coding A Simple Port Scanner 00:15:00 Adding Raw_Input To Our Port Scanner 00:09:00 Scanning The First 1,000 Ports 00:05:00 Coding An Advanced Port Scanner Part 1 00:13:00 Coding an Advanced Port Scanner Part 2 00:09:00 Finishing And Testing Our Scanner 00:09:00 Configuring IP Address And Installing Metasploitable 00:08:00 Returning Banner From Open Port 00:15:00 Coding A Vulnerability Scanner Part 1 00:12:00 Coding A Vulnerability Scanner Part 2 00:07:00 SSH and FTP Attacks Automating SSH Login Part 1 00:10:00 Automating SSH Login Part 2 00:09:00 Testing Our SSH Login Program 00:09:00 Coding A SSH Brute-Forcer 00:11:00 Executing Commands On Target After Brute-Forcing SSH 00:10:00 Anonymous FTP Login Attack 00:10:00 Username & password List Attack On FTP 00:18:00 Password Cracking SHA256, SHA512, MD5 00:09:00 Cracking SHA1 Hash With Online Dictionary 00:17:00 Getting Password From MD5 Hash 00:13:00 Cracking Crypt Passwords With Salt 00:24:00 Sniffers, Flooders and Spoofers Changing MAC Address Manually 00:09:00 Coding MAC Address Changer 00:17:00 Theory Behind ARP Spoofing 00:05:00 Crafting Malicious ARP Packet 00:19:00 Coding ARP Spoofer 00:14:00 Forwarding Packets And Restoring ARP Tables 00:08:00 Spoofing Our IP Address And Sending Message With TCP Payload 00:12:00 Running SynFlooder With Changed Source IP Address 00:11:00 Getting Source And Destination MAC Address From Received Packets 00:25:00 Sniffing FTP Username And Password Part 1 00:08:00 Sniffing FTP Username And Password Part 2 00:12:00 Getting Passwords From HTTP Websites 00:14:00 Cloning Any Webpage 00:11:00 Printing DNS Queries 00:10:00 Coding DNS Spoofer Redirecting Response To Cloned Page 00:17:00 Setting IP Table Rules And Running DNS Spoofer 00:11:00 Network Analysis Analyzing Ethernet Header 00:16:00 Analyzing IP Header Part 1 00:10:00 Analyzing IP Header Part 2 00:26:00 Analyzing TCP Header 00:15:00 Analyzing UDP Header 00:13:00 Multi-functioning Reverse Theory Behind Socket Programming 00:07:00 Wine And Pyinstaller Installation 00:08:00 Setting Up Listener 00:08:00 Establishing Connection Between Target And Server 00:07:00 Implementing Send & Receive Functions 00:11:00 Executing Commands On Target System 00:12:00 Importing JSON Library To Parse Data 00:08:00 Converting Python Backdoor To .Exe 00:08:00 Using OS Library To Change Directory 00:10:00 Downloading & Uploading Files To Target PC 00:19:00 Hiding Our Backdoor And Creating Persistence 00:14:00 Trying To Connect To Server Every 20 Seconds 00:08:00 Downloading Files To Target PC 00:12:00 Capturing Screenshot On Target PC 00:23:00 Administrator Privilege Check 00:08:00 Starting Other Programs With Our Shell 00:11:00 Running Our Shell As An Image, Audio, PDF 00:20:00 Coding a Keylogger Installing Pynput 00:06:00 Printing Space Character 00:09:00 Calling Timer On Our Keylogger 00:10:00 Adding Keylogger To Our Backdoor 00:13:00 Command and Control Center What Is A Threaded Server 00:05:00 Accepting Connections With A Thread 00:13:00 Managing Multiple Sessions 00:09:00 Testing Threaded Server With Windows 10 Target 00:09:00 Fixing Q Command 00:11:00 Coding Exit Function 00:14:00 Attacking Multiple Targets And Gathering Botnet 00:16:00 Website Penetration Testing Stealing Saved Wireless Passwords 00:22:00 Saving Passwords To A File 00:03:00 Bruteforcing Gmail 00:10:00 Bruteforcing Any Login Page Part 1 00:13:00 Bruteforcing Any Login Page Part 2 00:10:00 Finding Hidden Directories Part 1 00:05:00 Finding Hidden Directories Part 2 00:07:00 Discovering Subdomains 00:12:00 Changing HTTP Headers 00:14:00 Starting Basic And Digest Authentication Bruteforcer 00:10:00 Controlling Threads 00:09:00 Coding Run Function 00:10:00 Printing Usage And Testing Our Program 00:13:00 Taking A Look At Ransomware 00:08:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Formally Safeguarding Children Level 1: One Day Course 10am - 3.30pm Working Together to Safeguard Children 2018 & Keeping Children Safe in Education (2022) Updated This Course can also be run within your organisation for your staff group at a reduced cost contact us for a quote or if you have any other questions about this course talk to an adviser now online.
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse AdministratorDatabase Administrators Overview Use the Oracle Database tuning methodology appropriate to the available toolsUtilize database advisors to proactively tune an Oracle Database InstanceUse the tools based on the Automatic Workload Repository to tune the databaseDiagnose and tune common SQL related performance problemsDiagnose and tune common Instance related performance problemsUse Enterprise Manager performance-related pages to monitor an Oracle DatabaseGain an understanding of the Oracle Database Cloud Service In the Oracle Database 12c: Performance Management and Tuning course, learn about the performance analysis and tuning tasks expected of a DBA: proactive management through built-in performance analysis features and tools, diagnosis and tuning of the Oracle Database instance components, and diagnosis and tuning of SQL-related performance issues. In this course, you will be introduced to Oracle Database Cloud Service. Introduction Course Objectives Course Organization Course Agenda Topics Not Included in the Course Who Tunes? What Does the DBA Tune? How to Tune Tuning Methodology Basic Tuning Diagnostics Performance Tuning Diagnostics Performance Tuning Tools Tuning Objectives Top Timed Events DB Time CPU and Wait Time Tuning Dimensions Time Model Dynamic Performance Views Using Automatic Workload Repository Automatic Workload Repository Overview Automatic Workload Repository Data Enterprise Manager Cloud Control and AWR Snapshots Reports Compare Periods Defining the Scope of Performance Issues Defining the Problem Limiting the Scope Setting the Priority Top SQL Reports Common Tuning Problems Tuning During the Life Cycle ADDM Tuning Session Performance Versus Business Requirements Using Metrics and Alerts Metrics and Alerts Overview Limitation of Base Statistics Benefits of Metrics Viewing Metric History Information Viewing Histograms Server-Generated Alerts Setting Thresholds Metrics and Alerts Views Using Baselines Comparative Performance Analysis with AWR Baselines Automatic Workload Repository Baselines Moving Window Baseline Baselines in Performance Page Settings Baseline Templates AWR Baseslines Creating AWR Baselines Managing Baselines with PL/SQL Using AWR-Based Tools Automatic Maintenance Tasks ADDM Performance Monitoring Using Compare Periods ADDM Active Session History New or Enhanced Automatic Workload Repository Views Emergency Monitoring Real-time ADDM Real-Time Database Operation Monitoring Overview Use Cases Defining a Database Operation Scope of a Composite Database Operation Database Operation Concepts Identifying a Database Operation Enabling Monitoring of Database Operations Identifying, Starting, and Completing a Database Operation Monitoring Applications What is a Service? Service Attributes Service Types Creating Services Managing Services in a Single-Instance Environment Where are Services Used? Using Services with Client Applications Services and Pluggable Databases Identifying Problem SQL Statements SQL Statement Processing Phases Role of the Oracle Optimizer Identifying Bad SQL Top SQL Reports SQL Monitoring What is an Execution Plan? Methods for Viewing Execution Plans Uses of Execution Plans Influencing the Optimizer Functions of the Query Optimizer Selectivity Cardinality and Cost Changing Optimizer Behavior Optimizer Statistics Extended Statistics Controlling the Behavior of the Optimizer with Parameters Enabling Query Optimizer Features Reducing the Cost of SQL Operations Reducing the Cost Index Maintenance SQL Access Advisor Table Maintenance for Performance Table Reorganization Methods Space Management Extent Management Data Storage Using SQL Performance Analyzer Real Application Testing: Overview Real Application Testing: Use Cases SQL Performance Analyzer: Process Capturing the SQL Workload Creating a SQL Performance Analyzer Task SQL Performance Analyzer: Tasks Parameter Change SQL Performance Analyzer Task Page SQL Performance Management Maintaining SQL Performance Maintaining Optimizer Statistics Automated Maintenance Tasks Statistic Gathering Options Setting Statistic Preferences Restore Statistics Deferred Statistics Publishing Automatic SQL Tuning Using Database Replay Using Database Replay The Big Picture System Architecture Capture Considerations Replay Considerations: Preparation Replay Considerations Replay Options Replay Analysis Tuning the Shared Pool Shared Pool Architecture Shared Pool Operation The Library Cache Latch and Mutex Diagnostic Tools for Tuning the Shared Pool Avoiding Hard Parses Reducing the Cost of Soft Parses Sizing the Shared Pool Tuning the Buffer Cache Oracle Database Architecture: Buffer Cache Buffer Cache: Highlights Database Buffers Buffer Hash Table for Lookups Working Sets Buffer Cache Tuning Goals and Techniques Buffer Cache Performance Symptoms Buffer Cache Performance Solutions Tuning PGA and Temporary Space SQL Memory Usage Performance Impact Automatic PGA Memory SQL Memory Manager Configuring Automatic PGA Memory Setting PGA_AGGREGATE_TARGET Initially Limiting the size of the Program Global Area (PGA) SQL Memory Usage Automatic Memory Oracle Database Architecture Dynamic SGA Granule Memory Advisories Manually Adding Granules to Components Increasing the Size of an SGA Component Automatic Shared Memory Management: Overview SGA Sizing Parameters: Overview Performance Tuning Summary with Waits Commonly Observed Wait Events Additional Statistics Top 10 Mistakes Found in Customer Systems Symptoms Oracle Database Cloud Service: Overview Database as a Service Architecture, Features and Tooling Software Editions: Included Database Options and Management Packs Accessing the Oracle Database Cloud Service Console Automated Database Provisioning Managing the Compute Node Associated With a Database Deployment Managing Network Access to Database as a Service Scaling a Database Deployment Performance Management in the Database Cloud Environment Performance Monitoring and Tuning What Can be Tuned in a DBCS Environment?
Overview of AutoCAD Programming Using C#.NET Join our AutoCAD Programming Using C#.NET Level 7 course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The AutoCAD Programming Using C#.NET Level 7 course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The AutoCAD Programming Using C#.NET Level 7 course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! Get a Quick Look at The Course Content: This AutoCAD Programming Using C#.NET Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this AutoCAD Programming Using C#.NET Level 7. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the AutoCAD Programming Using C#.NET Level 7 course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This AutoCAD Programming Using C#.NET Level 7 is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the AutoCAD Programming Using C#.NET Level 7 course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this AutoCAD Programming Using C#.NET Level 7 Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Unit 01: Course Outline and Introduction Module 01: Introduction 00:01:00 Module 02: Who is this course for? 00:01:00 Module 03: What Will I Learn from this Course? 00:01:00 Module 04: What is CSharp (C#)? 00:01:00 Module 05: What is AutoCAD .NET API? 00:01:00 Module 06: What are the advantages of programming in AutoCAD .NET API? 00:02:00 Unit 02: .Net Framework and Visual Studio 2017 Community Edition Module 01: Section Overview 00:01:00 Module 02:.NET Framework Architecture Overview 00:03:00 Module 03: .NET Framework Class Library, Common Type System, Common Language Runtime 00:03:00 Module 04: More about.NET Framework Common Language Runtime (CLR) 00:02:00 Module 05: Visual Studio 2017 Integrated Development Environment (IDE) 00:03:00 Module 06: Visual Studio 2017 IDE Demo 00:07:00 Unit 03: C# Fundamentals Module 01: Section Overview 00:03:00 Module 02: DataTypes and Variables - Value Types (signed/unsigned integers) 00:04:00 Module 03: DataTypes and Variables - Signed and Unsigned Integer Demo 00:06:00 Module 04: DataTypes and Variables - Floating Point and Decimal 00:02:00 Module 05: DataTypes and Variables - Floating Point and Decimal Demo 00:04:00 Module 06: DataTypes and Variables - Boolean 00:03:00 Module 07: DataTypes and Variables - Reference Types 00:03:00 Module 08: DataTypes and Variables - Class Type 00:03:00 Module 09: DataTypes and Variables - Class Type - Demo 00:11:00 Module 10: DataTypes and Variables - Interface Type 00:01:00 Module 11: DataTypes and Variables - Array Type 00:02:00 Module 12: DataTypes and Variables - Array Type - Demo (Single Dimension) 00:08:00 Module 13: DataTypes and Variables - Array Type - Demo (Multi Dimension) 00:10:00 Module 14: C# Operators Overview 00:02:00 Module 15: C# Assignment Operators 00:03:00 Module 16: C# Assignment Operators - Demo 00:06:00 Module 17: C# Unary Operators 00:02:00 Module 18: C# Unary Operators - Demo 00:02:00 Module 19: C# Primary Operators 00:03:00 Module 20: C# Primary Operators - Demo 00:07:00 Module 21: C# Equality Operators 00:01:00 Module 22: C# Equality Operators - Demo 00:02:00 Module 23: C# Additive Operators 00:02:00 Module 24: C# Additive Operators - Demo 00:01:00 Module 25: C# Multiplicative Operators 00:01:00 Module 26: C# Multiplicative Operators - Demo 00:01:00 Module 27: C# - Relational and Type Operators 00:04:00 Module 28: C# - Logical, Conditional and Null Operators 00:04:00 Module 29: C# - Logical, Conditional and Null Operators - Demo 00:07:00 Module 30: C# Keywords (Reserved Words) 00:04:00 Module 31: C# - Conditionals Overview 00:01:00 Module 32: C# Conditionals - If-Then-Else Statement 00:03:00 Module 33: C# Conditionals - If-Then-Else Statement - Demo 00:07:00 Module 34: C# Conditionals - Switch Statement 00:03:00 Module 35: C# Conditionals - Switch Statement - Demo 00:04:00 Module 36: C# - Loops Overview 00:04:00 Module 37: C# Loops - For Loop 00:02:00 Module 38: C# Loops - For Loop - Demo 00:02:00 Module 39: C# Loops - Foreach Loop 00:02:00 Module 40: C# Loops - Foreach Loop - Demo 00:05:00 Module 41: C# Loops - While Loop 00:02:00 Module 42: C# Loops - While Loop - Demo 00:02:00 Module 43: C# Loops - Do While Loop 00:02:00 Module 44: C# Loops - Do While Loop - Demo 00:03:00 Module 45: Modifiers Overview 00:04:00 Module 46: Debugging Overview 00:03:00 Module 47: Debugging - Demo 1 00:05:00 Module 48: Debugging - Demo 2 00:12:00 Module 49: Debugging - Demo 3 00:06:00 Module 50: Error and Exception Handling - Overview 00:02:00 Module 51: ExceptionHandling - Demo 1 00:07:00 Module 52: ExceptionHandling - Demo 2 00:07:00 Module 53: ExceptionHandling - Demo 3 00:13:00 Module 54: Introduction to Object Oriented Programming (OOP) 00:04:00 Module 55: OOP - Encapsulation - Demo (Part 1) 00:11:00 Module 56: OOP - Encapsulation - Demo (Part 2) 00:12:00 Module 57: OOP - Inheritance - Demo (Part 1) 00:07:00 Module 58: OOP - Inheritance - Demo (Part 2) 00:05:00 Module 59: OOP - Polymorphism - Demo (Part 1) 00:10:00 Module 60: OOP - Polymorphism - Demo (Part 2) 00:03:00 Unit 04: Exploring AutoCAD .NET API Module 01: AutoCAD .NET API - Overview 00:01:00 Module 02: AutoCAD .NET API Assemblies 00:02:00 Module 03: Using AutoCAD .NET API in C# - Hello AutoCAD Demo Part 1 00:12:00 Module 04: Using AutoCAD .NET API in C# - Hello AutoCAD Demo - Part 2 00:04:00 Module 05: AutoCAD .NET API Object Hierarchy 00:03:00 Module 06: AutoCAD .NET API - Application Object Overview 00:03:00 Module 07: AutoCAD .NET API - Document Object Overview 00:03:00 Module 08: AutoCAD .NET API - Database Object Overview 00:03:00 Unit 05: Creating AutoCAD Objects using AutoCAD .NET API Module 01: Creating AutoCAD Objects using AutoCAD .NET API - Overview 00:01:00 Module 02: Creating a Line Object - Lab (Part 1) 00:14:00 Module 03: Creating a Line Object - Lab (Part 2) 00:03:00 Module 04: Creating a MText Object - Lab 00:10:00 Module 05: Creating a Circle Object - Lab 00:07:00 Module 06: Creating an Arc Object - Lab 00:05:00 Module 07: Creating a LWPolyline Object - Lab 00:05:00 Unit 06: Manipulate AutoCAD Objects Module 01: Manipulate AutoCAD Objects - Overview 00:01:00 Module 02: Copy Object using C# - Theory 00:01:00 Module 03: Copy Object using C# - Lab (Part 1) 00:11:00 Module 04: Copy Object using C# - Lab (Part 2) 00:02:00 Module 05: Copy multiple objects using C# - Lab (Part 1) 00:09:00 Module 06: Copy multiple objects using C# - Lab (Part 2) 00:01:00 Module 07: Erase Object using C# - Lab (Part 1) 00:06:00 Module 08: Erase Object using C# - Lab (Part 2) 00:05:00 Module 09: Move Object using C# - Lab (Part 1) 00:06:00 Module 10: Move Object using C# - Lab (Part 2) 00:02:00 Module 11: Mirror Object using C# - Lab (Part 1) 00:10:00 Module 12: Mirror Object using C# - Lab (Part 2) 00:02:00 Module 13: Rotate Object using C# - Lab (Part 1) 00:07:00 Module 14: Rotate Object using C# - Lab (Part 2) 00:03:00 Module 15: Scale Object using C# - Lab 00:05:00 Module 16: Copy Object Exercise 00:02:00 Module 17: Copy Object Solution 00:06:00 Module 18: Erase Object Exercise 00:02:00 Module 19: Erase Object Solution 00:07:00 Module 20: Move Object Exercise 00:02:00 Module 21: Move Object Solution 00:06:00 Module 22: Mirror Object Exercise 00:02:00 Module 23: Mirror Object Solution 00:06:00 Module 24: Rotate Object Exercise 00:02:00 Module 25: Rotate Object Solution 00:06:00 Module 26: Scale Object Exercise 00:01:00 Module 27: Scale Object Solution 00:05:00 Unit 07: Exploring AutoCAD Dictionaries (Layers, LineTypes, TextStyles) Module 01: Exploring AutoCAD Dictionaries - Layers Overview 00:03:00 Module 02: Listing all the Layers in the drawing using C# 00:11:00 Module 03: Creating a Layer in AutoCAD using C# 00:09:00 Module 04: Updating a Layer in AutoCAD using C# 00:09:00 Module 05: Turning the Layer On/Off in AutoCAD using C# 00:05:00 Module 06: Thawing/Freezing Layer in AutoCAD using C# 00:04:00 Module 07: Deleting a Layer in AutoCAD using C# 00:03:00 Module 08: Locking/UnLocking a Layer in AutoCAD using C# 00:05:00 Module 09: Assigning a Layer to an AutoCAD object using C# 00:03:00 Module 10: Exploring AutoCAD Dictionaries - LineTypes Overview 00:01:00 Module 11: Listing all the LineTypes in the drawing using C# 00:07:00 Module 12: Loading a LineType in the drawing using C# 00:07:00 Module 13: Setting the Current LineType in AutoCAD using C# 00:03:00 Module 14: Deleting a LineType in AutoCAD using C# 00:03:00 Module 15: Setting a LineType to an object using C# 00:04:00 Module 16: Exploring AutoCAD Dictionaries - TextStyles Overview 00:01:00 Module 17: Listing all the TextStyles in the drawing using C# 00:08:00 Module 18: Updating current TextStyle Font in AutoCAD using C# 00:10:00 Module 19: Setting the Current TextStyle in AutoCAD using C# 00:08:00 Module 20: Setting a TextStyle to an object using C# 00:04:00 Unit 08: User Input Functions Module 01: User Input Functions Overview 00:01:00 Module 02: Using GetString Method - Lab (Part 1) 00:13:00 Module 03: Using GetString Method - Lab (Part 2) 00:10:00 Module 04: Using GetPoint Method - Lab 00:12:00 Module 05: Using GetDistance Method - Lab 00:04:00 Module 06: Using GetKeyWords Method - Lab (Part 1) 00:12:00 Module 07: Using GetKeyWords Method - Lab (Part 2) 00:02:00 Unit 09: Selection Sets and Filters Module 01: Selection Sets and Filters - Overview 00:02:00 Module 02: Using SelectAll Method - Lab (Part 1) 00:11:00 Module 03: Using SelectAll Method - Lab (Part 2) 00:02:00 Module 04: Using SelectOnScreen Method - Lab (Part 1) 00:06:00 Module 05: Using SelectOnScreen Method - Lab (Part 2) 00:01:00 Module 06: Using SelectWindow Method - Lab 00:08:00 Module 07: Using SelectCrossingWindow Method - Lab 00:08:00 Module 08: Using SelectFence Method - Lab 00:08:00 Module 09: Using PickFirstSelection Method - Lab 00:11:00 Module 10: Using SelectionSet Filters - Overview 00:01:00 Module 11: Using SelectionSet Filters - Selecting Lines 00:09:00 Module 12: Using SelectionSet Filters - Selecting MTexts Lab 00:07:00 Module 13: Using SelectionSet Filters - Selecting Polylines Lab 00:03:00 Module 14: Using SelectionSet Filters - Selecting Blocks (FrenchDoors) Lab 00:07:00 Module 15: Using SelectionSet Filters - Selecting Blocks (BiFoldDoors) Lab 00:04:00 Module 16: Using SelectionSet Filters - Selecting objects in a Layer (Walls) Lab 00:07:00 Module 17: Using SelectionSet Filters - Selecting all objects in a Layer (Stairs) Lab 00:05:00 Module 18: Using SelectionSets and Filters - Exercises 00:02:00 Unit 10: Developing Title Block Project - Hands On! Module 01: TitleBlock Project - Overview 00:05:00 Module 02: Creating Project and TBlock Class - Lab 00:14:00 Module 03: Creating Classes for each Paper Sizes - Lab 00:07:00 Module 04: Creating TitleBlock Class - Lab 00:14:00 Module 05: Handling User Selected Paper Size - Lab 00:05:00 Module 06: Creating the TitleBlock Border Lines - Lab 00:06:00 Module 07: Creating the Horizontal Partition Lines - Lab (Part 1) 00:11:00 Module 08: Creating the Horizontal Partition Lines - Lab (Part 2) 00:05:00 Module 09: Creating Vertical Partition Lines - Lab 00:11:00 Module 10: Project Check on the Partition Lines - Lab 00:07:00 Module 11: Creating the TitleBlock Labels - Lab (Part 1) 00:10:00 Module 12: Creating the TitleBlock Labels - Lab (Part 2) 00:09:00 Module 13: Creating the TitleBlock Labels - Lab (Part 3) 00:11:00 Module 14: Project Check on the Labels 00:07:00 Module 15: Creating Drawing Information Texts 00:08:00 Module 16: Debugging the TitleBlock Project - Lab 00:10:00 Module 17: Completing and Running the TitleBlock Plugin 00:05:00 Module 18: Audit Drawing Project - Overview 00:02:00 Module 19: Audit Drawing Project - Demo 00:07:00 Module 20: Creating the AuditDrawing Project 00:11:00 Module 21: Creating the AuditDrawing DisplayOnScreen Method 00:14:00 Module 22: Creating the AuditDrawing Write to TXT File Method 00:08:00 Module 23: Creating the AuditDrawing Write to CSV File Method 00:06:00 Module 24: Creating the AuditDrawing Write to HTML File Method 00:14:00 Module 25: AuditDrawing Plugin Demo 00:04:00 Module 26: Creating the AuditBlock Method 00:05:00 Module 27: Creating the AuditBlock GatherBlocksAndCount Method 00:16:00 Module 28: Creating the AuditBlock DisplayOnScreen Method 00:06:00 Module 29: Creating the AuditBlock WriteToTXTFile Method 00:05:00 Module 30: Creating the AuditBlock WriteToCSVFile Method 00:05:00 Module 31: Creating the AuditBlock WriteToHTMLFile Method 00:07:00 Module 32: AuditBlock Completed Component - Demo 00:12:00 Unit 11: Conclusion Module 01: Conclusion 00:01:00
Explore the fascinating world of plants with our 'Introduction to Plant Science: Essential Concepts' course. From plant anatomy and photosynthesis to genetics, ecology, and economic importance, this comprehensive course provides a solid foundation in botany. Join us to cultivate your understanding of the essential principles that govern the life of plants and discover their crucial role in sustaining our planet. Perfect for biology enthusiasts, environmentalists, and those curious about the wonders of the plant kingdom. Start your journey into plant science today!
If you’ve had to take time off from your job for months or even years, contemplating a return to work can be difficult. How do you know if you’re ready? Are you well enough to return full-time or do you need to negotiate a phased approach? And what can you do to make sure the return itself goes as successfully as possible? This webinar starts to answer those questions - and many more! Content If you’ve had to take time off from your job for months or even years, contemplating a return to work can be difficult. How do you know if you’re ready? Are you well enough to return full-time or do you need to negotiate a phased approach? And what can you do to make sure the return itself goes as successfully as possible? I’ve helped many people in your situation find the right way to tackle their return to work, guiding them as they gauged if they were ready - and then advising them as to the best way to start approaching things with their employer. I very much enjoy helping my clients with this stage of their recovery journey, as it means things are going really well for them!I share so much value in this session! I've taken my experience of helping many, many people navigate this milestone and turned my best advice into a single session for you to benefit from.The event itself was a live webinar held in July 2023. This is your chance to purchase the recording of the webinar itself (1 hour)) and a written capture of the Q&A sessions held afterwards. My full client schedule means I won't be running this as a live event again for a while, so this is your chance to purchase it 'on demand' and benefit from the help I give at the time you need it (now!).Topics coveredHaving helped so many people, I’ve seen how successfully things go when certain elements are carefully thought through and put into place, and I share my Top Five pieces of advice with you at this live webinar. I talk about: How to know if/when you’re ready to start seriously considering a return to work Questions to ask yourself if you think you need to consider a change of career How to broach the topic of a phased return with your employer My experience of how Occupational Health (or similar functions) can help or hinder - and how to make sure it’s the former! Things to consider and address up-front to ensure your first couple of weeks go as well as they can. I also share some smart actions that you can put in place way before you're even contemplating going back to work, in order to smooth the way for a successful return when you're ready. So please don't think this webinar won't be useful to you if you know you've got a way to go yet. Not only will you be able to put these smart early actions in place, you'll also have a much clearer idea about how you'll manage your return when you're ready - helping you feel more confident and reduce any concerns sneaking in. You'll be able to relax knowing you'll be able to tackle things properly when the time's right.Please note that although the guidance and tips I give are not restricted to those who have office-based jobs, many of the examples I use are linked to office-based scenarios. This is because it's usually the case that the majority of attendees are indeed office-based (or similar). Please be assured that the majority of the tips I give can be refined and tailored to returning to any type of job.Although best known for the help I give to those experiencing extreme fatigue conditions such as ME/CFS, fibromyalgia and long covid, this session is relevant to anyone contemplating a return to work after an extended period of sick leave. Especially if you feel you'll need to negotiate a phased return. For example, after being diagnosed with an autoimmune condition, recovering from a major operation, or perhaps having completed a successful programme of cancer treatment.Please don't assume that the low price of this product in any way reflects a lack of valuable content. I could have priced it much higher, but I'm keen to help as many people as possible navigate this important milestone.