• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

59280 Courses

Microsoft SharePoint Modern Experience: Advanced Site Owner

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview In this course, you will perform advanced site-building and administration tasks. You will: Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location.Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance.Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration.This course focuses on these advanced site-building and administration tasks. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level

Microsoft SharePoint Modern Experience: Advanced Site Owner
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Office Word 2021: Part 3

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who want to use more advanced functionalities in Word, including image manipulation, collaboration and revision tracking, cross-referencing and linking, document security, forms, and process automation through macros. Overview In this course, you will learn to use the advanced capabilities of Word 2021. You will: Use images in a document. Create custom graphic elements. Collaborate on documents. Add reference marks and notes. Secure a document. Create and manipulate forms. Create macros to automate tasks. Microsoft© Word enables you to do far more than simple word processing. Word includes advanced image manipulation tools, collaboration features, cross-referencing and linking tools, entry forms and data collection, security features, and tools to automate document production. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Word Associate (Office 365 and Office 2021): Exam MO-100 and Word Expert (Office 365 and Office 2021): Exam MO-101 certifications. Manipulating Images Topic A: Integrate Pictures and Text Topic B: Adjust Image Appearance Topic C: Insert Other Media Elements Using Custom Graphic Elements Topic A: Create Text Boxes and Pull Quotes Topic B: Add WordArt and Other Text Effects Topic C: Draw Shapes Topic D: Create Complex Illustrations with SmartArt Collaborating on Documents Topic A: Prepare a Document for Collaboration Topic B: Mark Up a Document Topic C: Review Markups Topic D: Merge Changes from Other Documents Adding Document References and Links Topic A: Add Captions Topic B: Add Cross-References Topic C: Add Bookmarks Topic D: Add Hyperlinks Topic E: Insert Footnotes and Endnotes Topic F: Add Citations and a Bibliography Securing a Document Topic A: Suppress Information Topic B: Set Formatting and Editing Restrictions Topic C: Restrict Document Access Topic D: Add a Digital Signature to a Document Using Forms to Manage Content Topic A: Create Forms Topic B: Modify Forms Automating Repetitive Tasks with Macros Topic A: Automate Tasks by Using Macros Topic B: Create a Macro

Microsoft Office Word 2021: Part 3
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is experienced web developers who are new to User Experience (UX) and Responsive Design principles. These professionals typically have a solid understanding of front-end development technologies such as HTML, CSS, and JavaScript but seek to expand their skillset to create more user-centric, adaptable, and accessible web experiences. Roles that would benefit from this course include: Front-end Web Developers Full-stack Developers Web Designers Team Leads and Project Managers Freelance Web Developers Overview Working in a hands-on learning environment led by our expert UX coach, you'll learn to: Understand and apply UX principles and user-centered design processes: Participants will learn to identify the needs and preferences of users, create user personas, and apply UX best practices to develop intuitive, user-friendly web experiences. Design and implement responsive web layouts: Participants will gain the skills to create fluid grid layouts, use flexible images, and apply media queries to design web pages that adapt seamlessly across various devices and screen sizes. Optimize web performance for responsive designs: Participants will learn techniques to improve website performance, including image optimization, responsive images, and minification and concatenation of assets, ensuring a fast and smooth user experience across devices. Implement accessible web designs: Participants will understand the importance of accessibility in web design and learn to apply WCAG principles and accessible design patterns to create websites that are usable by a wide range of users, including those with disabilities. Collaborate effectively with designers, developers, and stakeholders: Participants will gain insights into design collaboration and handoff processes, enhancing their ability to communicate design decisions, provide and receive feedback, and work efficiently with team members and clients. In today's fast-paced digital world, user-centric and adaptable websites are no longer a luxury ? they're a necessity. By embracing UX and responsive design, you'll unlock the potential to elevate your websites, boosting user satisfaction and engagement. This, in turn, leads to higher conversion rates and a stronger online presence for your clients or organization, as well as better collaboration within your team, bridging the gap between designers, developers, and stakeholders.UX Design & Responsive Design for Experienced Web Developers is a three day, engaging hands-on workshop designed to equip you with the latest skills and best practices in User Experience (UX) and Responsive Web Design required to create seamless, user-friendly websites that adapt effortlessly across devices. This course will immerse you in the latest skills, best practices, and hands-on activities, empowering you to create exceptional, accessible websites that excel across devices and captivate users. Throughout the program you?ll explore the fundamentals of UX and responsive design, including user-centered design processes, mobile-first and desktop-first approaches, and design techniques for various devices and screen sizes. You'll gain practical experience creating responsive layouts, optimizing performance, and implementing accessible web designs, all while leveraging popular frameworks and design tools. You'll also gain valuable insights into performance optimization, accessibility, and collaboration strategies, ensuring you have the complete toolkit to excel in your field.By the end of this workshop, you?ll have gained a solid understanding of UX and responsive design principles, as well as hands-on experience in applying these concepts to real-world projects. You?ll be able to create more user-friendly, responsive, and accessible websites, and collaborate more effectively with your design and development teams. Introduction to UX and Responsive Design: Understanding User Experience What is UX? Importance of UX in web development UX principles and best practices User-centered design process Responsive Web Design Basics What is Responsive Web Design? Importance of Responsive Design in modern web development Fluid grid layout, flexible images, and media queries Hands-on Activity: Creating a Responsive Layout Designing a simple responsive layout using HTML, CSS, and media queries Breakdown and explanation of the code Testing responsiveness across different devices Mobile-first vs. Desktop-first Approaches Pros and cons of each approach Deciding which approach to use Designing for Different Devices and Screen Sizes Common breakpoints and device considerations Accessibility and usability across devices Typography, color, and other design elements in responsive design Hands-on Activity: Designing for Different Devices Modifying the previously created responsive layout to optimize for various devices Discussion and feedback on designs Advanced UX and Responsive Design Techniques: UX Research and Testing Importance of UX research Usability testing and user feedback A/B testing and heatmaps Navigation and Information Architecture Designing effective and user-friendly navigation Organizing content and information Common navigation patterns in responsive design Hands-on Activity: Designing Navigation for Responsive Websites Adding navigation elements to the previously created responsive layout Testing navigation on different devices and screen sizes Discussion and feedback on navigation designs Responsive Web Design Frameworks and Tools Overview of popular frameworks (Bootstrap, Foundation, etc.) Pros and cons of using frameworks Introduction to design tools (Sketch, Figma, Adobe XD) Hands-on Activity: Exploring Frameworks and Tools Experimenting with a chosen framework or design tool Redesigning the responsive layout using the selected framework/tool Sharing experiences and discussing the benefits and drawbacks UX and Responsive Design Best Practices: Design Patterns and UI Components Common design patterns in responsive web design Designing reusable UI components Consistency and usability in UI components Performance Optimization Importance of performance in responsive design Image optimization and responsive images Minification and concatenation of assets Hands-on Activity: Optimizing Performance (1.5 hours) Applying performance optimization techniques to the responsive layout Testing the improvements in performance Sharing results and discussing best practices Accessibility in UX and Responsive Design Importance of accessibility in web design Accessibility principles (WCAG) Accessible design patterns and techniques Hands-on Activity: Evaluating and Improving Accessibility Assessing the accessibility of the responsive layout Implementing accessibility improvements Testing and discussing the results Design Collaboration and Handoff Collaborating with designers, developers, and stakeholders Effective communication and documentation Design handoff tools and techniques Hands-on Activity: Simulating Design Handoff Participants will work in pairs to simulate a design handoff Reviewing, discussing, and providing feedback on each other's responsive layouts Sharing experiences and lessons learned

Mastering User Experience (UX) Design for Experienced Web Developers (TT4213)
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC) 101

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. Work on the Command Line LPI Objectives Covered Role of Command Shell Shells Gathering System Info Identifying the Shell Changing the Shell Shell Prompts Bash: Bourne-Again Shell Navigating the Filesystem Help from Commands and Documentation Getting Help Within the Graphical Desktop Getting Help with man & info Bash: Command Line History Bash: Command Editing Bash: Command Completion Shell and Environment Variables Key Environment Variables LAB TASKS Use Streams, Pipes, and Redirects LPI Objectives Covered File Redirection Piping Commands Together Filename Matching File Globbing and Wildcard Patterns Brace Expansion General Quoting Rules Nesting Commands Gotchas: Maximum Command Length LAB TASKS Manage File Permissions and Ownership LPI Objectives Covered Filesystem Hierarchy Standard Displaying Directory Contents Filesystem Structures Determining Disk Usage With df and du File Ownership Default Group Ownership File and Directory Permissions File Creation Permissions with umask Changing File Permissions SUID and SGID on files SGID and Sticky Bit on Directories User Private Group Scheme LAB TASKS Create, Delete, Find, and Display Files LPI Objectives Covered Directory Manipulation File Manipulation Deleting and Creating Files Physical Unix File Structure Filesystem Links File Extensions and Content Which and Type Where is Searching the Filesystem Alternate Search Method Manually Installed Shared Libraries LAB TASKS Work with Archives and Compression LPI Objectives Covered Archives with tar Archives with cpio The gzip Compression Utility The bzip2 Compression Utility The XZ Compression Utility The PKZIP Archiving/Compression format LAB TASKS Process Text Streams Using Filters LPI Objectives Covered Producing File Statistics The Streaming Editor Replacing Text Characters Text Sorting Duplicate Removal Utility Extracting Columns of Text Displaying Files Prepare Text for Display Previewing Files Displaying Binary Files Combining Files and Merging Text LAB TASKS Search Text Files Using Regular Expressions LPI Objectives Covered Searching Inside Files Regular Expression Overview Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis LAB TASKS Perform Basic File Editing Operations Using VI LPI Objectives Covered Text Editing vi and Vim Learning Vim Basic vi Intermediate vi LAB TASKS Create, Monitor, and Kill Processes LPI Objectives Covered What is a Process? Process Lifecycle Process States Viewing Processes Signals Tools to Send Signals Managing Processes Tuning Process Scheduling Job Control Overview Job Control Commands Nohup and Disown Uptime & w Persistent Shell Sessions with Screen Using screen Advanced Screen LAB TASKS Use RPM, YUM, and Debian Package Management LPI Objectives Covered Managing Software RPM Architecture Working With RPMs Querying and Verifying with RPM Installing Debian Packages Querying and Verifying with dpkg The alien Package Conversion Tool Managing Software Dependencies Using the Yum command yum downloader Configuring Yum The deselect & APT Frontends to dpkg Aptitude Configuring APT LAB TASKS Work with Partitions, Filesystem, and Disk Quotas LPI Objectives Covered Partition Considerations Logical Volume Management Filesystem Planning Partitioning Disks with fdisk & gdisk Resizing a GPT Partition with gdisk Partitioning Disks with parted Non-Interactive Disk Partitioning with sfdisk Filesystem Creation Filesystem Support Unix/Linux Filesystem Features Swap Selecting a Filesystem Filesystem Maintenance Mounting Filesystems Mounting Filesystems Managing an XFS Filesystem NFS SMB Filesystem Table (/etc/fstab) Configuring Disk Quotas Setting Quotas Viewing and Monitoring Quotas LAB TASKS Linux Boot Process LPI Objectives Covered Booting Linux on PCs GRUB 2 GRUB 2 Configuration GRUB Legacy Configuration Boot Parameters Uinit Linux Runlevels Aliases Systemd local-fs.target and sysinit.target Runlevel Implementation System Boot Method Overview Systemd System and Service Manager Modifying systemd services Systemd Targets Using systemd Shutdown and Reboot System Messaging Commands Controlling System Messaging LAB TASKS Determine and Configure Hardware Settings LPI Objectives Covered Managing Linux Device Files Hardware Discovery Tools Configuring New Hardware with hwinfo PC Architecture and Bus DMA & IRQ USB Devices USB Architecture Configuring Kernel Components and Modules Kernel Modules Handling Module Dependencies Configuring the Kernel via /proc/ LAB TASKS Linux Fundamentals Unix and its Design Principles FSF and GNU GPL ƒ?? General Public License The Linux Kernel Components of a Distribution Red Hat Linux Products SUSE Linux Products Debian Ubuntu Logging In got root? Switching User Contexts Gathering Login Session Info LAB TASKS Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC) 101
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC-2) 202

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 202 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: configure BIND to function as an authoritative and as a recursive, caching-only DNS server install and configure a web server install and configure a proxy server, including access policies, authentication and resource usage set up a Samba server for various clients configure a DHCP server configure PAM to support authentication using various available methods perform queries and updates to an LDAP server configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains configure an FTP server for anonymous downloads and uploads receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This course prepares students to take the 202 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server HTTP Services Basic Apache configuration Apache configuration for HTTPS Implementing Squid as a caching proxy Implementing Nginx as a web server and a reverse proxy File Sharing Samba Server Configuration NFS Server Configuration Network Client Management DHCP configuration PAM authentication LDAP client usage Configuring an OpenLDAP server E-Mail Services Using e-mail servers Managing E-Mail Delivery Managing Mailbox Access System Security Configuring a router Managing FTP servers Secure shell (SSH) Security tasks OpenVPN Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-2) 202 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-2) 202 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification  (LPIC-2) 202
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Administration

By Nexus Human

Duration 4 Days 24 CPD hours Overview Topics Include:Installation of a multi-node Kubernetes cluster using kubeadm, and how to grow a cluster.Choosing and implementing cluster networking.Various methods of application lifecycle management, including scaling, updates and roll-backs.Configuring security both for the cluster as well as containers.Managing storage available to containers.Learn monitoring, logging and troubleshooting of containers and the cluster.Configure scheduling and affinity of container deployments.Use Helm and Charts to automate application deployment.Understand Federation for fault-tolerance and higher availability. In this vendor agnostic course, you'll learn the installation, configuration and administration of a production-grade Kubernetes cluster. Introduction Linux Foundation Linux Foundation Training Linux Foundation Certifications Laboratory Exercises, Solutions and Resources Distribution Details Labs Basics of Kubernetes Define Kubernetes Cluster Structure Adoption Project Governance and CNCF Labs Installation and Configuration Getting Started With Kubernetes Minikube kubeadm More Installation Tools Labs Kubernetes Architecture Kubernetes Architecture Networking Other Cluster Systems Labs APIs and Access API Access Annotations Working with A Simple Pod kubectl and API Swagger and OpenAPI Labs API Objects API Objects The v1 Group API Resources RBAC APIs Labs Managing State With Deployments Deployment Overview Managing Deployment States Deployments and Replica Sets DaemonSets Labels Labs Services Overview Accessing Services DNS Labs Volumes and Data Volumes Overview Volumes Persistent Volumes Passing Data To Pods ConfigMaps Labs Ingress Overview Ingress Controller Ingress Rules Labs Scheduling Overview Scheduler Settings Policies Affinity Rules Taints and Tolerations Labs Logging and Troubleshooting Overview Troubleshooting Flow Basic Start Sequence Monitoring Logging Troubleshooting Resources Labs Custom Resource Definition Overview Custom Resource Definitions Aggregated APIs Labs Kubernetes Federation Overview Federated Resources Labs Helm Overview Helm Using Helm Labs Security Overview Accessing the API Authentication and Authorization Admission Controller Pod Policies Network Policies Labs

Kubernetes Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Keep Going With QuickBooks 2020 for Windows

By Nexus Human

Duration 2 Days 12 CPD hours Overview What's New in This Guide? The behind-the-scenes journal entry for transactions is now included. This course is a continuation of topics following ?Get Started with QuickBooks 2020 for Windows?. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2020. This course covers features that are in QuickBooks Pro and Premier 2020. Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with Quick Reports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Forms Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates

Keep Going With QuickBooks 2020 for Windows
Delivered OnlineFlexible Dates
Price on Enquiry

Just Enough Scala

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Developers Overview The basics of and motivation for using the functional programming paradigmFeatures of the Scala languageWorking with variables in ScalaUsing Scala collectionsControlling code flow in ScalaImporting and using Scala code libraries Scala training course will teach students the key language concepts and programming techniques, essential for students to focus on the covered subjects without having to also learn a complex programming language at the same time. Scala Basics Scala Background Information Key Scala Concepts Programming in Scala Variables Scala Variables Numerical Boolean String Collections Tuples The Collections Hierarchy Sets Lists Arrays Maps Common Conversions Flow Control Looping Iterators Functions Passing Functions Collection Iteration Methods Pattern Matching Libraries Classes and Objects Packages Import Additional course details: Nexus Humans Just Enough Scala training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Just Enough Scala course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Just Enough Scala
Delivered OnlineFlexible Dates
Price on Enquiry

iPhone Mobile App Development

By Nexus Human

Duration 5 Days 30 CPD hours The iPhone combines technologies of smartphones and personal computing. With a multitouch screen, built-in accelerometer and virtual keyboard, the iPhone also requires the mobile application developer to adopt a vastly different software design philosophy. With over a billion mobile apps sold, iPhone Programming is a critical part of the future of mobile technology. This five day course teaches the attendee all aspects of iOS mobile app development Introduction and Setup Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement Overview of Swift Functions The Basics of Object Oriented Programming in Swift Swift Subclassing and Extensions Arrays and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, and Storyboards Creating an Interactive iOS App Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Size Classes to Design Adaptable Universal iOS User Interfaces Using Storyboards in Xcode Organizing Scenes over Multiple Xcode Storyboard Files Using Xcode Storyboards to Create an iOS Tab Bar Application Working with the iOS Stack View Class iOS Stack View Tutorial iOS Split View Master-Detail Example Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController iOS UIPageViewController Application Data Storage with Files, iCloud, and Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS iOS Directory Handling and File I/O in Swift Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite SQLite based iOS Application using Swift and FMDB Working with iOS Databases using Core Data iOS Core Data Introduction to CloudKit Data Storage on iOS iOS CloudKit Example iOS CloudKit Subscription Example Touch, Taps, and Gestures An Overview of iOS Multitouch, Taps and Gestures iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS Gesture Recognition iOS 3D Touch Force Handling iOS 3D Touch Quick Actions iOS 3D Touch Peek and Pop Advanced View Options Basic iOS Animation using Core Animation iOS UIKit Dynamics ? An Overview Introduction to iOS Sprite Kit Programming iOS Sprite Kit Level Editor Game iOS Sprite Kit Collision Handling Extensions Introduction to Extensions in iOS iOS Today Extension Widget Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Multimedia, Facebook, and Twitter Accessing the iOS Camera and Photo Library iOS Camera Application iOS Video Playback using AVPlayer and AVPlayerViewController iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder The App Store Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iPhone Mobile App Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPhone Mobile App Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

iPhone Mobile App Development
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry