• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4387 Courses

Definitive Kubernetes for engineers

5.0(3)

By Systems & Network Training

Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.

Definitive Kubernetes for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Mastering 3ds Max: Complete Basic to Advanced Training

By ATL Autocad Training London

Who is this course for? Mastering 3ds Max: Complete Basic to Advanced Training. Looking to learn 3D modelling and animation? Look no further than our comprehensive 3ds Max beginner course! Gain a strong foundation in 3ds Max and learn essential skills for creating stunning 3D models and visualizations. Check our Website Training Duration: 40 hours Method: 1-on1 Sessions and Customized Content. Schedule: Choose your preferred time slot between 9 am and 7 pm, Mon to Sat, tailored to fit your schedule. Course Title: 3ds Max and V-Ray Comprehensive Training Program (40 Hours) Course Overview: Dive deep into the world of 3D visualization and rendering with our intensive 3ds Max and V-Ray training program. Over the course of 40 hours, you'll master the fundamental concepts, advanced techniques, and practical applications of both 3ds Max and V-Ray, empowering you to create stunning, photorealistic visualizations for various industries. Course Outline: Module 1: Introduction to 3ds Max (8 hours) Understanding the 3ds Max interface and tools Basic 3D modeling techniques and workflows Material creation and texture mapping Lights and cameras setup for scenes Module 2: Advanced 3ds Max Techniques (8 hours) Character modeling and animation Particle systems and dynamics Advanced lighting and shading techniques Scene composition and camera animation Module 3: V-Ray Fundamentals (8 hours) Introduction to V-Ray rendering engine V-Ray materials and texture mapping Lighting with V-Ray lights and HDRI maps V-Ray camera settings and depth of field Module 4: Advanced V-Ray Rendering (8 hours) Global illumination and image-based lighting V-Ray proxies and instancing Advanced V-Ray shaders and displacement maps Render elements and post-production techniques Module 5: Architectural Visualization with V-Ray (8 hours) Interior and exterior scene setup Realistic materials for architectural elements Lighting strategies for different times of the day Creating lifelike environments and atmospheric effects Course Features: Hands-On Learning: Engage in practical exercises and real-world projects to reinforce your skills and knowledge. Industry-Standard Tools: Work with the latest versions of 3ds Max and V-Ray, widely used in the professional 3D visualization industry. Expert Instruction: Learn from certified trainers and industry professionals with extensive experience in 3D modeling and rendering. Project-Based Assessments: Apply learned techniques to comprehensive projects, receiving feedback and guidance to refine your skills. Flexible Learning: Choose between in-person and online sessions, accommodating various schedules and learning preferences. Upon completing this 40-hour course, you will be equipped with the expertise to create visually stunning 3D renderings and animations, making you proficient in both 3ds Max and V-Ray for a successful career in architectural visualization, gaming, film production, and more. Upon completion, participants will: Master 3ds Max & V-Ray: Acquire advanced skills in 3ds Max and V-Ray for creating realistic 3D visualizations. Expert in Architectural Visualization: Specialize in architectural visualization techniques, ideal for interior designers and architects. Project-Based Proficiency: Apply learned skills to real projects, developing a professional portfolio. Recommended Jobs: Architectural Visualization Artist 3D Animator Product Visualization Specialist Interior Designer VR Developer Freelance 3D Artist Game Environment Artist Visualization Consultant This training opens doors to diverse roles in architecture, gaming, design, and more. Duration: 40 Hours Focus: Master 3ds Max and V-Ray for advanced 3D visualizations and architectural rendering. Learning Format: One-on-One Training for personalized attention. Availability: Book your sessions Monday to Saturday, 9 am to 7 pm, tailored to your schedule. Outcome: Expertise in 3ds Max, V-Ray, and specialized architectural visualization skills. Practical Focus: Hands-on projects and real-world applications for skill reinforcement. Certification: Upon completion, receive a certificate showcasing your advanced 3D modeling and rendering skills. This one-on-one course offers tailored training sessions from Monday to Saturday, 9 am to 7 pm, ensuring personalized attention and flexibility to suit your schedule. Download 3ds max Ongoing Email Support: We offer continuous email assistance, ensuring your queries are promptly addressed even after the course completion. Comprehensive Resources: Access extensive handouts and valuable documents designed to reinforce your learning experience. Flexible Financial Options: Explore adaptable financial support options, including installment plans and assistance through job center plus and DWP. Reach out to us for specific details. Satisfaction Guarantee: Although it's highly improbable given our exceptional quality and skilled tutors, if you find dissatisfaction after your initial session, we will promptly address your concerns. If necessary, a refund may be provided (Terms and conditions apply). Optimized Software Experience: Receive guidance on optimizing your computer for enhanced software performance in applications like Autocad, 3ds Max, and Photoshop, whether you're on MAC or PC platforms. Industry Connections: Leverage our industry ties as we actively showcase your portfolio to potential employers. Many of our students have secured jobs through our recommendations, offering valuable career opportunities.

Mastering 3ds Max: Complete Basic to Advanced Training
Delivered in London or OnlineFlexible Dates
£1,440

Gas Turbines, Co-Generation and Combined Cycle Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of gas turbines, co-generation, and combined cycle power plants with EnergyEdge's comprehensive classroom training course.

Gas Turbines, Co-Generation and Combined Cycle Power Plants
Delivered In-PersonFlexible Dates
£2,699 to £2,799

ST1+ST4 Applications in Cardiothoracic Surgery Q&A - 2024

5.0(12)

By London School of Cardiothoracics

⏰️ Available from 24th October at 7pm Sign up once for either one or both sessions for £20 ONLY! ST1 on 29th Oct: 7 - 8pm ST4 on 30th Oct: 7 - 8pm Both sessions will be held on the same link which will be sent on payment. Price: £20 (non-refundable) for Q&A only! OR…… Watch our pre-recorded webinar of ST4 and ST1 Applications and Interviews & attend the Q&A for £25 BELOW !! : https://london-school-of-cardiothoracics.cademy.co.uk/st1-st4-applications-in-cardiothoracic-surgery-webinar-2024-536c1b8c 📝 Sign up to listen to a breakdown of the scoring matrix, how best to boost your portfolio to get a national training number and all the interview tips we can give you! Hear from National trainees who have been through the process, their advice, hints and tips. 🚨 Sign up and get access to the Live Q&A where we will talk about any updates and changes to the 2025 scoring matrix - delivered by current and recently appointed ST4 and ST1 trainees. This session will give you the best opportunity to discuss in real time any changes that come out! Please ensure you check all mail folders, including spam/junk folders, and add 'notifications@system.cademy.co.uk' Cademy to the list of 'safe senders', to ensure you receive all future emails. 

ST1+ST4 Applications in Cardiothoracic Surgery Q&A - 2024
Delivered OnlineFlexible Dates
£20

Transformer Operational Principles, Design, Selection, Maintenance and Troubleshooting for Oil and Gas and Utilities

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of transformer operational principles, design, selection, maintenance, and troubleshooting for oil, gas, and utilities with EnergyEdge's comprehensive course.

Transformer Operational Principles, Design, Selection, Maintenance and Troubleshooting for Oil and Gas and Utilities
Delivered In-PersonFlexible Dates
£2,899 to £2,999

Python GUI Programming - Building a Desktop Application with Tkinter and SQLite

By Packt

Implement a hands-on Python GUI project: Build a Cryptocurrency portfolio app with Python, Tkinter, SQLite3, and the CoinMarketCap API

Python GUI Programming - Building a Desktop Application with Tkinter and SQLite
Delivered Online On Demand2 hours 41 minutes
£125.99

ASP.NET Core MVC - Cross-Platform Development

By Packt

In this course, you will learn to use ASP.NET Core MVC to build cross-platform web applications that can run on any operating system, including Windows, Linux, and macOS. A carefully designed course to provide a comprehensive overview of ASP.NET Core MVC and help you become proficient in its use.

ASP.NET Core MVC - Cross-Platform Development
Delivered Online On Demand5 hours 24 minutes
£41.99

About this Virtual Instructor Led Training (VILT)  The Advanced Reservoir Engineering VILT course will address modern practical aspects of reservoir engineering during 5 half-days packed with lectures, virtual exercises, discussions and literature reviews. The participants' understanding of fundamental concepts and modern practical reservoir engineering methods will be deepened and a wide range of topics will be addressed. Topics covered The VILT course will emphasise reservoir engineering applications and include topics such as: Rock properties of clastic and carbonate reservoirs Reservoir characterisation Reservoir fluid behaviour Identification of main production mechanisms Design and analysis of well tests Production forecasting Application of Decline Curve Analysis in mature fields Detailed modeling of wells and reservoirs Water flooding Application of EOR methods Reserves and resource estimation Reservoir simulation approaches, model construction and well, aquifer and fluid modelling Development planning Uncertainty handling and scenario methods Depending on the background and requirements of the participants, some topics may be given more emphasis.   Training Objectives In this VILT course, reservoir engineering methods will be addressed which are of use in the daily reservoir engineering practice. The focus will be on practical applicability. Use is made of practical and actual reservoir engineering problems and examples to illustrate relevant subjects. By attending this VILT course, participants will have a deeper knowledge of modern reservoir engineering practices for reservoir development and production, including the construction and use of reservoir models. Target Audience The VILT course is intended for experienced reservoir engineers with prior technical or engineering exposure to production activities. Petroleum engineers and geoscientists who require more than general knowledge of reservoir engineering will also find this course useful. Participants are invited but not obliged to bring a short presentation (max of 15 minutes) on a practical problem they encountered in their work. This will then be explained and discussed in the VILT class. A short test or quiz will be held at the end the VILT course. Training Methods This VILT course will be delivered online over 5 half-days. There will be 2 blocks of two hours per day, including lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be required. Two breaks of 10 minutes will be provided each day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your course leader is an independent Reservoir Engineering Consultant. He provides project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Before he retired from Shell in 2012, he held positions as Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead. He is a petroleum engineering professional, with global experience, mostly in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). He has been involved in reserves and resource management, has extensive reservoir modelling and reservoir simulation expertise, and wide experience in the design and delivery of training programmes for employee development. PROFESSIONAL EXPERIENCE 2012 - 2016 Independent Reservoir Engineering Consultant Project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Delivering specialised and general Reservoir Engineering courses to a multitude of international companies. 2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for the Middle East Region Assurance of SEC and SPE compliance of reserves and resources in Shell Middle East region. Contributor to the 2012 SPE guidelines on reserves and resources assessment. 2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for QA/QC of Reservoir Engineering in global E&P projects as well as for staff development. (over 60 international Reservoir Engineers) 2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Technology Applications and Research /Shell Representative Office Oman Petroleum Engineering Manager PE manager in the Carbonate Research centre, at Sultan Qaboos University in Oman. Industrial research projects and support to teaching on recovery aspects of carbonate reservoir development. Design and delivery of industrial courses on carbonate reservoirs 1997- 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir engineer. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria). Co-ordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. 1992- 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Directed Shell Group Reservoir Engineering Training. Introduced advanced PE training events, QA/QC and learning transfer measures, Design and delivery of reservoir engineering and multidiscipline courses to Shell staff from a wide range of nationalities. 1985- 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt. Major contributor to the Shell internal Gas Field Planning Tool development. 1984- 1985 Geological Survey of the Netherlands (RGD), Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Reservoir Engineering
Delivered in Internationally or OnlineFlexible Dates
£1,536 to £2,899

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Deploying Machine Learning Models with Flask for Beginners

By Packt

The goal of this course is to teach you how to deploy machine learning models in Flask. You'll also learn to deploy applications to the web. You'll learn to train your models, test them, and ensure that they are of the best quality.

Deploying Machine Learning Models with Flask for Beginners
Delivered Online On Demand2 hours 31 minutes
£33.99