We discuss ideas and projects that use the arts to bring positive change to people who are or have been homeless. We are holding monthly global video meetings to give people in our network, or simply interested in arts and homelessness, a chance to get together remotely. The meetings are relaxed and fun and a place to share news, ideas and creativity. This year we are adding some amazing training sessions and professional development to the schedule. We are also cahnging from two sessions to just the one at 2pm every last wednesday of the month. Come and enjoy the space, learn some new things and maske some new friends.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Conflict within a workplace can appear in many forms, from personality conflicts between employees to employee and supervisor issues. This course will equip you with the knowledge of conflict management strategies and the practical skills to take steps to help to resolve situations of conflict.
This course aims to raise awareness about the triggers, signs and symptoms, and preventive measures to better manage and support people living with asthma.
Duration 2 Days 12 CPD hours This course is intended for Enterprise Network System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completion of this course, you will be able to: Identify the various components and architecture of the Cisco SD-WAN solution. Deploy vEdge routers in a secure extensible network. Create templates to aide in the deployment and operation of the secure extensible network. Configure and verify overlay routing in the secure extensible network. Create simple policies to control traffic flow in the secure extensible network. The Cisco SD WAN Operation and Deployment (SDWFND) v1.0 is a 2-day, instructor-led, hands-on course that addresses the Cisco SD-WAN Operations and Deployment functions. Cisco SD-WAN is a new technology, this training covers salient features such as zero-touch provisioning, secure network bring-up, configuration using feature templates, configuration of Overlay Management Protocol (OMP) and policies for network traffic management. Module 1: SD-WAN Solution Components Lesson 1: SD-WAN Solution Overview Lesson 2: SD-WAN Components Lesson 3: Managing SD-WAN Components Module 2: Secure Extensible Network Deployment Lesson 1: Secure Control Plane Operation Lesson 2: Secure Control Plane Deployment Lesson 3: Secure Data Plane Operation Lesson 4: Cloud Deployments and Redundancy Module 3: SD-WAN Template Deployment Lesson 1: Templates Overview Lesson 2: Feature Templates Lesson 3: Device Templates Lesson 4: Attaching Devices to Templates Module 4: SD-WAN Overlay Routing Lesson 1: Overlay Routing Overview Lesson 2: OMP Route Advertisements Lesson 3: OMP Route Redistribution and Network Segmentation Lesson 4: Configuring and Verifying Overlay Routing Module 5: SD-WAN Policies and QoS Lesson 1: Policy Overview and Framework Lesson 2: vSmart Policy Operation and Construction Lesson 3: Forwarding and QoS Overview Lesson 4: Configuring and Monitoring QoS Forwarding Lab outline Lab 1: Manage and Monitor SD-WAN Components Lab 2: Deploy and Verify SD-WAN vEdge Routers Lab 3: Deploy SD-WAN Templates Lab 4: SD-WAN Overlay Routing Lab 5: SD-WAN Policies
Overcoming Overwhelm: A jam-packed 60 minute masterclass covering how to identify your energy leaks so you can create more success and impact in your career, without burnout.
Getting Started The MBA in Educational Leadership and Management Top Up programme is a dynamic educational offering that aims to equip future educational leaders with essential skills. This programme places a strong emphasis on effective leadership, educational policy, and management within a variety of educational settings. Graduates from this programme emerge well-prepared to take on leadership roles within academic institutions and drive positive changes in the field of education. The MBA in Educational Leadership and Management is designed to empower educators and education professionals with advanced knowledge and skills in leadership and management. This programme presents an excellent opportunity for individuals with a relevant postgraduate diploma or an equivalent qualification to "top up" their credentials to earn a full MBA degree. Throughout this programme, students engage deeply with the intricacies of educational leadership and management, gaining valuable insights into the latest theories, practices, and strategies relevant to the educational sector. The curriculum strongly focuses on critical areas such as leadership theory, organisational management, policy development, and educational change management. The programme provides students with the tools needed to address the complex challenges that educational organisations face today, ultimately enhancing the quality of education. This MBA in Educational Leadership and Management enhances career prospects and actively contributes to improving educational systems. The programme comprises two phases; the first is the Qualifi Level 7 Diploma in Educational Management and Leadership, awarded by Qualifi and delivered by the School of Business and Technology London. The second phase is the MBA in Educational Leadership and Management Top Up, awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. About Awarding Body Anglia Ruskin University began in 1858 as the Cambridge School of Art founded by William Beaumont. It was then merged with the Cambridge shire College of Arts and Technology and the Essex Institute of Higher Education and was renamed Anglia Polytechnic. It was then given university status in 1992 and renamed Anglia Ruskin University in 2005. The university has campuses in the UK (Cambridge, Chelmsford, London and Peterborough), as well as they are partnered with institutions around the world including Berlin, Budapest, Trinidad, Singapore and Kuala Lumpur. Assessment Assignments and Project No examinations Entry Requirements A bachelor's degree Applicant without a bachelor's degree but holding significant relevant experience will be considered for entry on a case-by-case basis. A good command of English (IELTS 6.0 or equivalent). Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. Structure Phase -1 - Qualifi Level 7 Diploma in Educational Management and Leadership The QUALIFI Level 7 Diploma in Educational Management and Leadership is made up of 120 credits, which equates to hours 1200 of TQT. Learners must complete two mandatory units and choose four optional units to achieve a minimum of 120 credits. Mandatory Units Leadership Qualities and Practice in Education Unit Reference -T/618/3135 TQT : 200 Credit : 20 The unit will explore how team performance can be evaluated and optimised to realise strategic business and operational objectives. Contemporary Issues in Education: Theory, Policy and Practice Unit Reference - A/618/3136 TQT : 200 Credit : 20 This unit provides learners with an understanding of the link between educational research, policy and practice. Optional Units Managing Change in an Educational Context Unit Reference - F/618/3137 TQT : 200 Credit : 20 This unit aims to develop learners' understanding of educational leadership and management in supporting change and developing leadership in their educational context. Pedagogy and Practice in Education Unit Reference - J/618/3138 TQT : 200 Credit : 20 This unit aims to develop learners' theoretical and practical grounding in approaches to teaching and learning related to subject academic knowledge and educational practices. Leading Reflective Practice in Education Unit Reference - L/618/3139 TQT : 200 Credit : 20 This unit aims to develop learners' understanding of reflective practice to apply this to their and other's roles in an educational context, leading to planning for personal development. Research Methods in Education Unit Reference - F/618/3140 TQT : 200 Credit : 20 This unit aims to develop research skills, including different approaches, proposal formulation, planning, data analysis, and exploring research's relationship with evidence-based practice. Postgraduate Study of Childhood, Education and Family Support Unit Reference - A/650/6687 TQT : 200 Credit : 20 The unit will offer a framework for each individual's evaluation of their academic and professional action plans for personal and professional learning. Research Methods for Childhood, Education and Family Support Unit Reference - D/650/6688 TQT : 200 Credit : 20 This unit aims to help learners identify and develop a focus on research and approaches to data analysis, such as phenomenological and hermeneutic approaches and descriptive statistics. Triangulating Theory and Practice Unit Reference - F/650/6689 TQT : 200 Credit : 20 This unit aims to assist educators in comprehending the theories that drive recommendations for best practices and calls for action in a challenging and quickly evolving professional context. Contemporary Issues in Education Unit Reference - K/650/6690 TQT : 200 Credit : 20 This unit aims to introduce learners to various emerging topics from many educational sectors. Phase 2 - MBA in Educational Leadership and Management Top-Up Programme Structure Developing Effective Management Systems Dissertation (Major Project) Delivery Methods The programme comprises two phases; the first is the Qualifi Level 7 Diploma in Educational Management and Leadership, awarded by Qualifi and delivered by the School of Business and Technology London. The School of Business and Technology London offers flexible learning methods, including online and blended learning, allowing students to choose the mode of study that suits their preferences and schedules. The program is self-paced and facilitated through an advanced Learning Management System. Students can easily interact with tutors through the SBTL Support Desk Portal System for course material discussions, guidance, assistance, and assessment feedback on assignments. School of Business and Technology London provides exceptional support and infrastructure for online and blended learning. Students benefit from dedicated tutors who guide and support them throughout their learning journey, ensuring a high level of assistance. The second phase is the MBA in Educational Leadership and Management Top Up, awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.
This course explores Autism and the current body of thinking and knowledge around Autistic Spectrum Disorders. This enables learners to consider how to adapt their practice with useful strategies to better support an individual with autism.
All employees should be aware of and knowledgeable about health and safety in the workplace. This course is ideal for all staff and employees at all levels, providing them with the underpinning health and safety knowledge that they will require to work safely and efficiently on a daily basis.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real