Duration 1 Days 6 CPD hours Overview In writing, it is important to make sure your message is easy to understand, that you have included all the necessary information, and that the points are expressed clearly. In business writing, it is also essential to convey information in a professional and courteous manner using proper formatting. Learn how to perfect your business writing in this one-day workshop. This one-day workshop will help you teach participants how to: Write and proofread your work so it is clear, concise, complete, and correct. Apply these skills in real world situations. Use language that is courteous. Understand the proper format for memos, letters, and emails. Determine whether your writing can be easily understood by your intended audience. Learn how to perfect your business writing in this one-day workshop.While there are many types of business writing, this workshop will provide tools to write effective memos, emails, and letters, as well as briefly touch on reports and proposals. The 4 C?s: Clear, Concise, Complete, and Correct Good writing must be clear, concise, complete, and correct. In this session, learn how to write with these principles in mind. Manners and Courtesy Courtesy is an important part of good business writing. During this session, participants will learn ways to make their writing respectful and polite. Writing Memos Memos are another challenge that many writers face. Participants will look at parts of a memo and complete a fun exercise. Writing Effective E-mails Mostly everyone today uses email to communicate at work and at home. This session will give participants some tips on writing effective emails and managing email. Reports and Proposals Reports and proposals are two important types of business writing. In this session, an overview of the steps involved with writing these pieces is presented. Writing Business Letters This session reviews the steps for writing a business letter, types of letters, and the parts of a business letter. Participants then examine samples of business letters to determine the type and the parts of each letter. Readability Index The readability index determines the difficulty level of a written piece. Participants will apply the index to a sample and to their own work. Proofreading Participants learn about checking the grammar, spelling and punctuation in their written pieces, and then review their pre-assignment. Reviewing Your Writing In this session, participants complete a final review of their piece of writing. Workshop Wrap-Up At the end of the workshop, students will have an opportunity to ask questions and fill out an action plan.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
This programme concentrates on the core planning skills needed to develop sound practical project plans in a team environment. This enables the plan to be modified should requirements change or difficulties arise. The programme also gives participants the confidence to practise those skills and apply them in the work environment and deliver their projects more successfully in the future. Participants learn fundamental project management concepts and terminology, demystifying the project management process, and, in particular, how to: Break a project down into manageable sections and ensure nothing is left out Understand and apply estimating techniques to develop realistic estimates Sequence work effectively and carry out critical path analysis to determine project duration and which tasks to pay closest attention to Manage project risk effectively to protect project value Monitor, control and re-plan the project to best keep it on track Close out the project and ensure the project comes to an orderly end 1 Introduction Self-introductions and personal objectives Course objectives Sharing of project issues 2 Project management concepts Characteristics of a project and what should be kept as operational responsibilities Understanding the triple and quadruple constraints - and their limitations Prioritising requirements through the MOSCOW technique Product v project life cycle Key project roles and responsibilities - the importance of sponsorship and clarity of roles 3 Starting a project, and the importance of the terms of reference / project brief Avoiding the pressure to 'just do it'! The importance and benefits of planning The best time to learn! Initial project documentation - the BOSCARDI approach 4 Breaking the work down Understanding alternative breakdown structures such as the product breakdown structure and work breakdown structure Guidelines for creating a work breakdown structure to ensure the full work scope is identified 5 Estimating Alternative estimating techniques and associated confidence levels Further considerations - loss and resource factors 6 Organising the work Use of network diagrams to develop a clear sequence of work Critical path analysis and calculating the project duration and task float - and usage 7 The management of project risk Understanding the nature of project risk The risk analysis and risk management processes How to best manage threats and opportunities Running a risk workshop Using the risk register 8 Scheduling the work The importance of the Gantt chart and understanding its limitations The Gantt chart layout and using alternative views such as the tracking Gantt Using alternative dependencies 9 Resource issues Assigning resources and resolving resource overloads Crashing and fast-tracking your project and potential issues to look out for 10 Controlling the project The control cycle and alternative feedback mechanisms Alternative progress reporting Assessing the impact The importance of re-planning The benefits of control Change control - the importance of impact analysis The steps of change control and the use of the issue register 11 Closing the project The project closure checklist Reviewing the project - things to avoid Developing meaningful lessons and ensuring they are applied effectively The post-project review - its importance to the organisation
This Tableau Desktop Training course is a jumpstart to getting report writers and analysts with little or no previous knowledge to being productive. It covers everything from connecting to data, through to creating interactive dashboards with a range of visualisations in two days of your time. For Private options, online or in-person, please send us details of your requirements: This Tableau Desktop Training course is a jumpstart to getting report writers and analysts with little or no previous knowledge to being productive. It covers everything from connecting to data, through to creating interactive dashboards with a range of visualisations in two days of your time. Having a quick turnaround from starting to use Tableau, to getting real, actionable insights means that you get a swift return on your investment of time and money. This accelerated approach is key to getting engagement from within your organisation so everyone can immediately see and feel the impact of the data and insights you create. This course is aimed at someone who has not used Tableau in earnest and may be in a functional role, eg. in sales, marketing, finance, operations, business intelligence etc. The course is split into 3 phases and 9 modules: PHASE 1: GET READY MODULE 1: LAUNCH TABLEAU Check Install & Setup Why is Visual Analytics Important MODULE 2: GET FAMILIAR What is possible How does Tableau deal with data Know your way around How do we format charts Dashboard Basics – My First Dashboard MODULE 3: DATA DISCOVERY Connecting to and setting up data in Tableau How Do I Explore my Data – Filters & Sorting How Do I Structure my Data – Groups & Hierarchies, Visual Groups How Tableau Deals with Dates – Using Discrete and Continuous Dates, Custom Dates Phase 2: GET SET MODULE 4: MAKE CALCULATIONS How Do I Create Calculated Fields & Why MODULE 5: MAKE CHARTS Charts that Compare Multiple Measures – Measure Names and Measure Values, Shared Axis Charts, Dual Axis Charts, Scatter Plots Showing Relational & Proportional Data – Pie Charts, Donut Charts, Tree Maps MODULE 6: MAKE TABLES Creating Tables – Creating Tables, Highlight Tables, Heat Maps Phase 3: GO MODULE 7: ADD CONTEXT Reference Lines and Bands MODULE 8: MAKE MAPS Answering Spatial Questions – Mapping, Creating a Choropleth (Filled) Map MODULE 9: MAKE DASHBOARDS Using the Dashboard Interface Dashboard Actions This training course includes over 25 hands-on exercises and quizzes to help participants “learn by doing” and to assist group discussions around real-life use cases. Each attendee receives a login to our extensive training portal which covers the theory, practical applications and use cases, exercises, solutions and quizzes in both written and video format. Students must use their own laptop with an active version of Tableau Desktop 2018.2 (or later) pre-installed. What People Are Saying About This Course “Excellent Trainer – knows his stuff, has done it all in the real world, not just the class room.”Richard L., Intelliflo “Tableau is a complicated and powerful tool. After taking this course, I am confident in what I can do, and how it can help improve my work.”Trevor B., Morrison Utility Services “I would highly recommend this course for Tableau beginners, really easy to follow and keep up with as you are hands on during the course. Trainer really helpful too.”Chelsey H., QVC “He is a natural trainer, patient and very good at explaining in simple terms. He has an excellent knowledge base of the system and an obvious enthusiasm for Tableau, data analysis and the best way to convey results. We had been having difficulties in the business in building financial reports from a data cube and he had solutions for these which have proved to be very useful.”Matthew H., ISS Group
Course Overview: It is important that everybody who works in the care environment recognises the signs of potential eating and drinking difficulties and is able to support service users to eat and drink. This course combines both theory and practical sessions to equip those who work in care settings with this knowledge. Course Aims: Define Dysphagia Identify the main parts of the human mouth and pharynx Recognise signs and symptoms of aspiration Know when to refer a service user Recognise good positions at mealtimes Experience food textures and being fed in different positions Management responsibilities
Dysphagia presents a multifaceted challenge that can culminate in aspiration, malnutrition, and a diminished quality of life. This course serves as a comprehensive exploration of dysphagia, unravelling its root causes, evaluation techniques, and measures for ensuring secure swallowing practices.
This course aims to raise awareness about the triggers, signs and symptoms, and preventive measures to better manage and support people living with asthma.
Expand your equestrian horizons with one of our cross-country days or weekends. Heights of obstacles and technical difficulty to suit all levels of riders. Jumps mimicing ski-runs with Greens (75cms), Blues (90cms), Reds (1m) and Blacks. So always something to aim for and improve riding skills. Experienced horses available for all levels.
A free 30 minutes taster session on plant focussed meditation or garden therapy. The workshop aims to bring calm, equanimity and well-being. There will be guided meditation and mindful botanical drawing.
A level one-to-one tuition